Documente Academic
Documente Profesional
Documente Cultură
Review 2019
1
Defence Forces
Review 2019
ISSN 1649-7066
Published for the Military Authorities by
the Public Relations Section at the Chief of Staff’s Branch,
and printed at the Defence Forces Printing Press, Infirmary Road, Dublin 7.
2
Launch of the Defence Forces Review
In conjunction with an Academic Seminar
University College Dublin, Dublin
05th December 2019
3
Defence Forces Review 2019
Preface
“The secret of change is to focus all your energy, not in fighting the old, but on building
the new.”
Socrates
It is a privilege for me as Officer in Charge Defence Forces Public Relations Branch to launch
the Defence Forces Review for 2019. The purpose of the Defence Forces Review is to provide
a forum in which contributors can present their research and facilitate discussion on a wide
range of defence-related matters for the benefit of the wider Defence Community. I believe that
this issue of the Review will achieve all of these goals, and will, in turn stimulate widespread
discussion amongst readers.
Building on recent publications, this year’s review primarily focusses on a specific theme, in
the case of this year’s review the theme is: ‘The 22nd Century Military Force: Technology,
Innovation and Future Force Concepts.’ The articles reflect, among other things, the changing
character of warfare, the exponential changes in technology and the likely effects these will have
on militaries and the manner in which military operations might be conducted in the future
operating environment.
The Editor of the Defence Forces Review for 2019 is Lieutenant Commander Paul Hegarty.
Despite a very heavy schedule as an Instructor in the Command and Staff School he assumed
this editorial burden with energy and commitment, displaying a commendable level of academic
ambition for this project.
For this year’s edition, he has assembled a diverse group of contributors, working in academic
collaboration with the University College Dublin (UCD) School of Politics and International
Relations (SPIRe), and the UCD Clinton Institute. A special word of gratitude to his fellow
editors, Professor Ben Tonra (SPIRe, UCD) and Dr. Eugenio Lilli (Clinton Institute, UCD),
for their expert insights and invaluable contributions in making this collaborative effort
a success.
Again, many thanks to all our contributors without whose commitment and generosity the
production and publication of this year’s review would not be possible.
Further copies of the Review are available from the Defence Forces Public Relations Branch
at info@military.ie or online at http://www.military.ie/info-centre/publications/defence-
forces-review.
J. Whittaker
Lieutenant Colonel
Officer in Charge
Public Relations Branch
4
Defence Forces Review 2019
Editor's Notes
The illiterate of the 21st century will not be those who cannot read and write, but those
who cannot learn, unlearn, and relearn.
Alvin Toffler
The multiplicity of, and the threats deriving from technological based systems continues to
rise as the dawn of the fourth industrial revolution breaks on the horizon. Modern society is
undergoing a technological revolution that is fundamentally altering the way we live, work and
relate to one another. While it remains uncertain how this will exactly unfold, it is evident, that
the response required to manage it must be integrated and comprehensive, and will involve
all elements of society, including the military. The future will be characterised by a fusion of
technologies that are blurring the lines between the physical, digital and biological spheres.
Technology continues to advance at a rate not foreseen by those who have used it historically
in a military context, and while the fundamental nature of warfare may not be changing; its
character certainly is, as changes in thinking and technology evolve. How do we comprehend,
contextualise, and conceptualise the changes wrought by emerging technologies, which are
converging and being applied in completely unforeseen ways? History is littered with inflection
points, such as the infamous ‘horse and tank’ moment, and the future military organisation
will have to understand and learn to manage the power of information, in data processing,
Artificial Intelligence, robotics, bio-science, materials and autonomy, to name but a few.
While it is acknowledged that the starting point for future strategy must account for the world
as it is because of the way it is, the Defence Forces must be prepared to evolve and adapt as
threats develop. Military organisations, similar to the society they represent, must learn how
to manage and prepare for this (un)certainty and ensure that their structures, equipment and
doctrine evolve to meet both current and future potential threats. Fundamental to achieving
this objective is the need for military organisations to innovate and to work collaboratively
with external partners, such as business and academia, in learning and discussing
potential solutions.
This year’s edition of the Defence Forces Review is published in academic collaboration with
the University College Dublin (UCD) School of Politics and International Relations (SPIRe),
and the UCD Clinton Institute. It reflects on the current structure and associated capabilities
of the Irish Defence Forces, while simultaneously inviting comprehensive critical analysis with
a view to contributing to the current discourse so that we can learn about how to best prepare
for the future operating domain, and its associated challenges.
This edition presents contemporary assessments on selected topics in an attempt to add to the
current debate, and proposes solutions and a discourse that the Defence Forces can draw and
learn from. The papers cover topics that demonstrate a wealth of knowledge both internal to
the Defence Forces and in wider academia, both national and international, that in turn will
promote further debate on these pertinent and current issues.
In 2019, the Defence Forces delivered its first Joint Command and Staff Course (JCSC),
which marks a paradigm shift in how the Defence Forces trains and prepares its future senior
leaders on its flagship course. The abstracts from this course, as part of the MA in Leadership,
5
Defence Forces Review 2019
Management and Defence Studies (LMDS) program are included in the Review. To view any
of these listed, please contact the Defence Forces Library at; info@military.ie.
The review concludes with short biographical details of the authors who kindly contributed
to this year’s edition. The Editorial team would like to thank the contributors for their
enthusiasm and willingness to prepare papers for submission, thereby participating to the
discourse on what a 22nd Century Defence Forces could resemble and what challenges it
may face. We are also indebted to the Defence Forces Printing Press (DFPP), in particular,
Lt (NS) Colm Fox, and Pte Shane Curran, for their time, patience and professionalism in
delivering a high quality finished product.
Editorial Team
Lt Cdr Paul Hegarty Prof Ben Tonra Dr. Eugenio Lilli
Command &Staff School SPIRe, UCD Clinton Institute, UCD
6
Defence Forces Review 2019
7
Defence Forces Review 2019
8
Defence Forces Review 2019
Table of Contents
Article Page
9
Defence Forces Review 2019
Table of Contents
Article Page
10
Table of Contents
Article Page
11
12
Network Centric Warfare
with Software Defined
Networks Enabled Remotely
Piloted Aircraft Systems
Dr. Mubashir Husain Rehmani and Dr. Donna O’Shea
Ríomh - Intelligent Secure Systems Group, Department of Computer
Science, Cork Institute of Technology, Ireland
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
Abstract
It is envisioned that the 22nd century military will be heavily reliant on information and
communication technologies (ICT). The use of ICT in future military operations will dictate
how tactical strategies will be designed. In this context, network centric warfare will
provide the basis to consultation, command, and control (C3) for the military operations.
In the areas behind the enemy lines, where military personnel access is dangerous,
remotely piloted aircraft systems (RPAS) will be used for military operations. RPAS are
generally unmanned, therefore, they need to be operated remotely and communication
between the RPAS and the operator is normally established through IEEE L-Band,
IEEE S-Band, and ISM Bands. The operator will issue the command and RPAS will
react accordingly to complete the tasks. However, these wireless spectrum bands are
susceptible to jamming by the attackers. Moreover, when these RPAS operate behind
the enemy lines, there is high probability that offensive cyber operations may break their
communication channels/links. Thus, there is a need to look for switching to reliable
communication links frequently for RPAS. To achieve this, software defined networks
(SDN) enabled RPAS are highly suitable. In this paper, we propose a counter strategy
that can be adopted by the Irish Defence Forces in order to operate in an environment
where offensive cyber operations have been used increasingly. We will model this
problem as Multi-Armed Bandit (MAB) by using reinforcement learning (an advanced
machine learning technique) to help SDN controller to learn the strategy adopted by
the attacker. We also discuss that how the Irish Defence Forces will equip themselves
for joint operations with UN/EU/NATO forces for SDN-enabled RPAS and what
development should be implemented with professional and military education (PME).
14
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
cost RPAS (if downed by the enemy). For tactical military operations, these RPAS are deployed
redundantly and forming clusters so that mission critical tasks can be achieved - forming a
RPAS network7. Recent examples have witnessed trials of RPAS networks as swarms, which
co-ordinate with each other establishing a multi-hop communication network to increase
the communication range, to relay Ground Control Centre (GCC) commands to the RPAS
operating at the forefront and to achieve last mile connectivity for ground troops.
There may be few other application scenarios in the battlefield where RPAS can play its role.
Imagine wireless sensor nodes are deployed in hostile environments and these sensor nodes
capture different information such as images, coordinates, videos, and audio. Since these sensor
nodes are energy-constrained devices, they cannot directly communicate this information
to the GCC. Therefore, RPAS can visit them and collect the required information, which
can then pass to the GCC for decisions, or the same information can pass to the ground
battlefield troops.
5G and beyond 5G communication networks are suggested with the vision to improve user
experience, more bandwidth and less delay. With these requirements in mind, the 5G public
private partnership (5G-PPP) suggested to increase the number of deployed base stations,
however, with such massive deployments of base stations at micro level, the expenditure to
deploy, operate, and maintain i.e., capital/operational (CAPEX/OPEX) will increase. An
alternative approach is to use RPAS for coverage where user traffic demands is increasing.
Consequently, the resulting network will be a RPAS network. This same concept can be
extended and used in battlefield environments to provide coverage and connectivity for troops
on ground.
7 J. L. Burbank, P. F. Chimento, B. K. Haberman and W. T. Kasch, “Key Challenges of Military Tactical Networking and the Elusive Promise of
MANET Technology,” in IEEE Communications Magazine, vol. 44, no. 11,(2006), pp. 39-45.
8 I. Zacarias, L. P. Gaspary, A. Kohl, R. Q. A. Fernandes, J. M. Stocchero and E. P. de Freitas, “Combining Software-Defined and Delay-Tolerant
Approaches in Last-Mile Tactical Edge Networking,” in IEEE Communications Magazine, vol. 55, no. 10, (2017), pp. 22-29.
9 D. A. Eisenberg, D. L. Alderson, M. Kitsak, A. Ganin and I. Linkov, “Network Foundation for Command and Control (C2) Systems: Literature
Review,” in IEEE Access, vol. 6, (2018), pp. 68782-68794.
10 A. K. Cebrowski and J. J. Garstka, “Network-centric warfare: Its origin and future,” US Nav. Inst. Proc., vol. 124, no. 1, (1998), pp. 28-35.
15
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
In network-centric warfare, the high ranked decision making echelons can use information
and communication technologies (ICT) to monitor and guide troops deployed on ground
leading to the creation of Network-centric RPAS system. Therefore, for a timely and informed
decision, the importance of last mile connectivity of troops as well as real time information
communication to both high rank decision making echelons to battle field troops is important
to save lives and to avoid any collateral damage.
16
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
It is worth mentioning that use of technologies such as SDN to support network centric warfare
is becoming prominent in military planning and operations. For instance, the United States
Army proposed third offset strategy (TOS) as Department of Defence (DoD)’s innovation
initiative in 201411. The goal of TOS is to form long range research and planning program
considering technological advancements in areas such as unmanned autonomous aircraft
systems, lasers, and cognitive warfare, and other promising technologies12. Other similar efforts
have been taken by research institutes in US such as Lincoln Laboratory in Massachusetts
Institute of Technology (MIT)13 to develop prototypes for RPAS and investigate research
challenges and issues. In addition to these efforts, dedicated workshops have been taken place
in US to discuss secure and reliable communication for multi-domain operations1415.
11 https://www.iris-france.org/wp-content/uploads/2016/12/ARES-Group-Policy-Paper-US-Third-Offset-Strategy-December2016.pdf
12 https://www.irishexaminer.com/breakingnews/business/tech/the-us-army-is-apparently-very-close-to-having-laser-weapons-723251.html
13 https://www.ll.mit.edu/r-d/communication-systems/tactical-networks
14 http://jointnetworks.dsigroup.org/
15 https://futurenetworks.ieee.org/conferences/2019-workshop-tactical-and-first-responder-networks
16 V. Sharma, F. Song, I. You and H. Chao, “Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs,” in
IEEE Network, vol. 31, no. 6, (2017), pp. 78-85.
17
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
The proposed strategy focuses on allowing the SDN controller to utilise SDN technology as
an aid in learning the strategy being adopted by the attacker. 17. Each RPAS will act as an SDN
switch, which will get directions from the Ground Control Centre (GCC), where a centralized
SDN controller monitors all the activities and dynamics occurring within the RPAS network.
These dynamics also include the active monitoring of link characteristics. The SDN controller
at GCC will be running reinforcement-learning algorithm using Multi-Armed Bandit (MAB)
approach. For the sake of brevity, to avoid technical details and to consider the general
audience of this article (Defence Forces Review), we ask the readers to consult Algorithm 1
of our recently published work to know the exact working of this MAB algorithm that can be
applied for SDN based RPAS network18.
In the proposed strategy, the RPAS will act as the SDN-enabled switch using OpenFlow protocol.
OpenFlow protocol will be served as SouthBound Application Programming Interface (API)
and help GCC SDN controller to pass the commands to the RPAS (SDN switches). A dedicated
control channel will be used between GCC (SDN controller) and RPAS (SDN switches). The
RPAS may be equipped with various medium access protocols (depending upon the operating
environment) to communicate between each other. Note that though Satellite Communication
(SATCOM) can be used to establish communication between GCC and RPAS, this research
posits that it will increase the cost. Therefore, this paper suggests using IEEE L-Band, IEEE
S-Band, and ISM Bands for such communications.
18
Network Centric Warfare with Software Defined Networks
Enabled Remotely Piloted Aircraft Systems
ICT can be taught to DF in consultation with CIT. Irish Defence Forces Training Centre
(DFTC) can use the expertise developed in CIT. The Naval Service and CIT already have a
strong collaboration in the shape of National Maritime College of Ireland and this collaboration
can further be extended with Department of Computer Science, CIT and DFTC.
Conclusion
This paper has discussed how software defined network enabled RPAS can be used for network
centric warfare to support the joint operations with UN/EU/NATO forces for SDN-enabled
RPAS and what development should be implemented with professional and military education
(PME) by DFTC. We also presented the advantages of using software defined networks in
RPAS networks along with our proposed reinforcement learning based counter strategy to
reliable RPAS communication. As plan of future work, we intend to deploy a testbed consisting
of several RPAS and compare its results acquired after Mininet based simulation results. The
goal is to deploy an attacker to disturb and jamming the communication between GCC and
RPAS and then see how well the proposed strategy sustains under different jamming strategies
and attacks.
19
20
Small States’ Capability
Enhancement for Peacekeeping:
What can Ireland learn from other
Countries?
Dr. Brendan Flynn
School of Political Science and Sociology, NUI, Galway.
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
Abstract
This paper examines how small states manage technology for their future force profile in
the specific domain of procurement for peacekeeping, crisis and humanitarian response
missions. Given that small states typically have rather limited budgets, their ability to
innovate is usually narrow. This paper explores, briefly, whether other countries offer
lessons for the Irish military that are transferable? Three case studies on capability
procurements are offered. These include New Zealand’s procurement of a large multi-
role vessel to give strategic sealift capabilities, Austria’s purchase of Hercules transport
aircraft conferring operational mobility, and Finland’s ongoing investment in fleets of
protected tactical vehicles for overseas deployments. While none of these procurements
have been free from various political or technical problems, nor without significant costs,
they each offer lessons in how small states can procure capabilities that offer greater
operational and tactical flexibility, while enhancing their country’s strategic reach and
profile. The analytical point made here is that small states need to be ambitious, think
flexibly and act creatively to equip their peacekeepers.
1 Hartley, Keith (2017) The Economics of Arms. Newcastle Upon Tyne: Agenda, pp.43-48.
2 Till, Geoffrey (2014) “Are Small Navies Different?”, pp.21–31 in Mulqueen, Michael, Deborah Sanders and Ian Speller (eds.). Small Navies:
Strategy and Policy for Small Navies in War and Peace. Farnham: Ashgate. At p.23.
22
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
their protection, with a blend of old and new weapons, tactics and strategies: Kalashnikov and
machete wielding militias with 3-D printed drones and mobile phone based offensive cyber
hacking and jamming capabilities3.
There has also been a shift in UN peacekeeping doctrine which places increasing emphasis
on protection of civilians and human security, as much as force protection, and several UN
missions have been criticized for neglecting the former, although depends on the details of a
specific mandate as to how extensive such responsibilities can be. The implication of this is that
tomorrow’s peacekeepers will require a balance between assets that protect themselves, and the
type of mobility and firepower that allows them to protect specific populations at discrete sites,
such as refugee camps.
The days of deploying lightly equipped basic infantry units in soft-skinned vehicles, protected
by their organic small arms and the blue UN flag are long gone. More flexible and joint forces
seem required, blending air, naval, intelligence specialists with local and other friendly forces.
Military co-operation with civilian decision-makers, agencies and NGOs has become essential.
Peacekeepers must be situationally aware and have excellent intelligence, with greater levels of
intrinsic force protection all of which tends towards numerically smaller deployments but with
higher technology needs and often a greater logistical footprint.
For some small states, one can discern a trend towards providing tiny niche forces, sometimes
following a Special Forces template, with the lightest of vehicles and weapons, de facto
operating under the logistical and protective screen of larger forces. However, this often places
such units at the operational mercy of other contingents, and the political influence of niche
units is easily diluted. A small state that always contributes a sub-platoon sized detachment of
Special Forces will not likely be given senior command positions or be much listened to at the
operational mission level4. If small states want to be relevant and influential in peacekeeping,
they need to figure out how to offer force packages that cross a threshold well beyond the
tokenistic or niche nor have them burdened by excessive national political caveats that limit
their operational flexibility. This implies land units of at least reinforced company size, and
credible aerial and maritime assets as well. In the following sections three diverse small states
are examined to draw lessons about force modernization with regard to specific procurements
relevant for peacekeeping.
3 On insurgent abilities for electronic and communication warfare see Gorman, Siobhan, Yochi J. Dreazen, and August Cole, “Insurgents
hack US drones.” Wall Street Journal December 17th, 2009, and Doubleday, Justin. “Russia-backed insurgents have’ exceptional’ jamming
capability: US Army Joins Ukraine’s Electronic-Warfare Fight Against Rebels.” Inside the Army 27, no. 4 (2015): 4-5. For a more reflective
piece: Weinbaum, Cortney, Steven Berner, and Bruce McClintock. SIGINT for anyone: The growing availability of signals intelligence in the
public domain. No. PE-273-OSD. RAND Corporation Washington United States, 2017; On the ubiquity of new technologies such as mobile
phones alongside old technologies see: Macdonald, Fraser, and Jonathan Kirami. “Women, mobile phones, and M16s: Contemporary New
Guinea highlands warfare.” The Australian Journal of Anthropology 28, no. 1 (2017), pp.104-119; See also: Lewis, Jeffrey William. “The Human
Use of Human Beings: Suicide Bombing, Technological Innovation, and the Asymmetry of Modern Warfare.” Global Politics Review 2, no. 2
(2016): 9-27. On insurgent use of drones see: Bunker, Robert J. Terrorist and insurgent unmanned aerial vehicles: Use, potentials, and military
implications. Army War College Carlisle Barracks, P.A., Strategic Studies Institute, United States Army War College Press, 2015, https://
apps.dtic.mil/dtic/tr/fulltext/u2/a623134.pdf; Esther, Ulrike. “The global diffusion of unmanned aerial vehicles (UAVs), or ‘drones’,” pp. 78-98
in Aaronson, Mike, Wali Aslam, Tom Dyson, Regina Rauxloh (eds.) Precision strike warfare and international intervention: strategic, ethico-legal
and decisional implications. Routledge, 2014; On the lethality and prevalence of simple and old weapons like machetes see: Verwimp, Philip.
“Machetes and firearms: The organization of massacres in Rwanda.” Journal of Peace Research 43, no. 1 (2006): 5-22, or for a more general
overview see Chapter 6 on “War” in Edgerton, David. The Shock of the Old: Technology and Global history since 1900. London: Profile, 2006.
4 Note this observation is not a critique of contributing special forces to peace-keeping missions per se. They can provide excellent situational
awareness, vital intelligence and are ideal for local forces training and interaction. The point is that such small force elements are not a substitute
by themselves for a more substantive national peacekeeping presence.
23
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
Peacekeeping remains a core operational priority for the New Zealand Defence Forces5, and
while some of these operations have been classic UN led missions, such as UNTSO6 in the
Golan, or the Sinai based MFO7, others have been more controversial and challenging, notably
the deployment of NZDF special forces deployments in Afghanistan.
Peacekeeping operations close to home in East Timor (1992-2012), the Solomon Islands/
Bougainville (2003-2013), and Tonga (2006) were intensive and reinforced the importance of
having credible maritime logistics and amphibious capabilities for remote regions. Aviation
assets could not reach every location nor deliver bulky supplies economically. The NZDF
have also engaged in peacekeeping or maritime stabilization operations much further away:
an infantry force in Bosnia (1994-96), making a P-3K Orion available to NATO and then
EUNAVFOR off the coast of Somalia and deploying a frigate in the Aegean with NATO’s
Operation Active Endeavor8.
To be globally relevant, the small and geographically remote NZDF has had to adopt an
expeditionary mindset as a default setting and the ways and means to give effect to this.
Crucially this strategic orientation has been recognized in successive official policy statements9
and in procurement decisions.
Accordingly, in 2004 the New Zealand government gave approval for a Multi-Role Vessel (MRV),
which is a logistics ship with some amphibious operationally capability. This was commissioned
into service in 2007 as HMNZS Canterbury. In fact, the idea for such a ship was a long-
standing goal10 and today there is a contemporary trend for MRV procurement with several
designs available. To save money, the Canterbury was based on a modified commercial ferry.
5 McDougall, Derek. “Peacekeeping from Oceania: Perspectives from Australia, New Zealand and Fiji.” The Round Table 106, no. 4 (2017):
453-466. For an up to date list of NZDF deployments see: http://www.nzdf.mil.nz/operations/default.htm
6 Typically, about 8 NZDF observers. See: https://untso.unmissions.org
7 See: http://mfo.org/en
8 On the New Zealand Navy, see: Paget, Steven. “The ‘best small nation navy in the world’? The twenty-first century Royal New Zealand
Navy.” Australian Journal of Maritime & Ocean Affairs 8, no. 3 (2016): 230-256.
9 See for example the Defence White paper of 2016, at pp.20-22. http://www.nzdf.mil.nz/downloads/pdf/public-docs/2016/Defence-White-
Paper-2016.pdf
10 In 2002 a Maritime Forces Review was conducted which suggested an entire integrated procurement programme, “Project Protector”, which
included dropping a third frigate for a more flexible multi-role vessel. Before that, in 2000, a report on Sea-lift capabilities had suggested such
a vessel be procured. Tringham, Kate (2016) ‘Canterbury tales re-told: RNZN multirole vessel deliver’, Jane’s International Defence Review, 8th
June. Available at: http://www.defence.govt.nz/assets/Uploads/Canterbury-tales-re-told-RNZN-multirole-vessel-delivers.PDF
24
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
In retrospect it might have been better to go with a more conventional and proven amphibious
support ship, because the initial entry into service was delayed by vessel handling, sea-keeping
and ballast problems. However, buying a traditional amphibious warfare ship would have been
much more costly, revealing a tension between being cost sensitive on the procurement of
very large and expensive assets versus running higher project management risks of technical
problems in meeting the desired specifications. Small states watching every penny can end up
skimping which means in the end actually spending more!
Moreover, these technical woes became for a brief period quite politicized after a fatality aboard
and no less than two separate court of inquiries and an independent expert commission
appointed to investigate11. A number of technical fixes were quickly adopted, and the
shipbuilders made a substantial financial settlement. Today it appears the NZ Navy are quite
happy with the vessel and in 2016, it was hard at work responding to a cyclone hit Fiji islands.12
The lesson here is that large-scale technically complex procurements require careful project
and political risk and communications management over the long-life cycle of the project,
with swift action to mitigate problems. There was sufficient institutional leadership within the
NZDF and the NZ Defence Ministry to see the project to its conclusion, a vital prerequisite for
what has been on balance, a procurement success.
The vessel was deployed operationally, in 2009, after a Tsunami struck Samoa and again in
dealing with the aftermath of natural disasters in Canterbury city (2011) and Vanuatu and Fiji
(2015-2016). The vessel demonstrated a unique ability to deliver thousands of tons of aid and
vehicles in roll-on-roll-off fashion, while also providing a secure offshore floating base for co-
ordination in situ13.
From the perspective of force modernization, Canterbury is the lynchpin for a Joint Task Force
concept which integrates NZDF land elements with air force expertise on helicopters all in a
combined tactically deployable and logistically resilient ‘package’14. The NZDF can deploy a
reinforced mechanized infantry company, their armoured vehicles and then sustain them from
ashore for up to 30 days, including providing them with command, control and intelligence
functionality from the ship as floating base, well beyond their entire Exclusive Economic Zone.
In this way the vessel has become a laboratory for ‘jointness’ across the entire NZDF, and a
good example of how some procurements have multiple force level benefits.
11 Tringham, Op.Cit.
12 See: http://www.navy.mil.nz/mtf/cant/default.htm
13 Paget, p.238-239.
14 Paget, p. 241-242.
25
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
Like Ireland, Austria has a strong track record in peacekeeping, often in the classic UN led
operations but with a strategic culture very different from New Zealand, avoiding the use
of force or more kinetic roles15. Unlike Ireland, Austria is landlocked so does not require a
navy, and Austrian neutrality historically was different from Ireland’s experience, being
originally imposed by the Soviet Union as a condition of the return to full sovereignty in 1955.
Nonetheless, like Ireland, Austria remains outside of any formal military alliance and military
spending is low, even though a small domestic arms industry exists.
Because Austria is land-locked, heavy air lift has become a vital issue for participation in
overseas peacekeeping. Many European states have experimented with different ways to secure
heavy airlift, which is not easy because the huge aircraft involved are very costly.
Since 2009, there is a so called Heavy Airlift Wing, based in Hungary, which pools a fleet of
three C-17 strategic airlifters, access to which is shared among 10 NATO member states as well
as Sweden and Finland. Since 2010, the European Air Transport Command (EATC), based in
the Netherlands, is a consortium of seven EU states16 that have agreed to pool their large aerial
refueling aircraft and a suite of strategic and tactical airlift transporters (A400M, Hercules,
C295, etc.). It has on its books (actually a rota of ‘hours per tonne of cargo’) over 200 aircraft
or about 75% of the European air transport capacity17. Since 2006 the German led Strategic
Airlift Interim Solution (SAIIS), has provided a pool of Russian AN-124 giant aircraft available
for NATO and EU heavy lift requirements, however, since 2018 this contract has been non-
functioning due to ongoing tensions with Russia18.
For many years, the only air transport assets available to Austria were just two Shorts Skyvans.
Austria has not participated in any of these ‘pooling’ arrangements because the decision was
made in the late 1990s to procure their own heavy lift air transport assets, the only question
being how to afford these. Three ex-RAF C-130K Hercules were procured in 2002-2003 in a
15 Schmidl, Erwin A. (2013) ‘Peacekeeping Contributor Profile: Austria’, Providing for Peacekeeping, at http://www.providingforpeacekeeping.
org/2014/04/03/contributor-profile-austria/
16 Britain is leaving the EU but remains apparently committed to the EATC, so it is actually six: France, Germany, Netherlands, Spain and Italy,
with Belgium operating its own and a single A400M for Luxembourg.
17 See: See: https://eatc-mil.com/en
18 Waters, Will, (2018) ‘Volga-Dnepr confirms withdrawal from NATO SAlIS contract’, Lloyd’s Loading List, Tuesday, 01 May 2018. While
other commercial air charters are available for military cargo, they cannot economically carry outsize loads such as helicopters and the heavier
armoured vehicles.
26
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
government to government sale managed by the UK’s MoD Disposal Service Agency, explicitly
to support overseas peacekeeping. These aircraft were refurbished to a high standard19 by
Marshall Aerospace when originally delivered, and again after the Chad deployment in 2011
and 2013, including the fitting of some basic defensive aid suites20. The later expense probably
reflected concern over risks of surface to air missile attack. As part of the deal, Marshall
Aerospace were also contracted to provide technical service support and training was provided
for up to 9 crews.
These reconditioned aircraft certainly proved their worth in 2009 in Chad: at least 125 flights
were undertaken with 2,135 tons of cargo and the aircraft were also heavily tasked with support
of Austrian peacekeepers in Kosovo and Bosnia. Another important mission was in response
to the Asian Tsunami disaster in 2004. However, these assets are only enablers of mobility
for peacekeepers and the Austrian’s discovered during their 2009 Chad deployment that if
the main airport in any particular theatre is seized by hostile elements there is no way such
vulnerable aircraft can land, reinforcing the importance of joint capabilities to secure airbases21.
The final case examined here concerns land mobility for peacekeepers, looking at Finland. The
Finnish situation is quite different from Ireland, with their conscript armed forces oriented
towards large-scale territorial defence. This means peacekeeping vies for salience with the need
for a large mechanized land army (Maavoimat). There is also a domestic arms industry and
therefore political pressure to buy Finnish.
The Finns (and Ireland) deployed the large, 1980s era, SISU Pasi armoured personnel carriers
(APCs), successfully in the Lebanon during the 1980s and 1990s22 However, the SISU’s were
relatively bulky and unwieldly, and while they had reasonable resistance to IEDs they had
19 According to one source these revisions included: “structural upgrade, major servicing and installation of an automatic flight management
system, upgraded avionics, a traffic collision avoidance system, INS navigation system, digital engine and fuel management systems and the
Rockwell Collins FMR-200x colour weather radar.” Ayton, Mark (2003) ‘Herks for Austria’, Air Forces Monthly, May, pp.68-69.
20 Mader, Georg (2010) ‘Survey Austria: On the Edge’, Air Forces Monthly, Feb, pp.74-78.
21 Early on in the Chad mission, rebels seized the Capital’s airport which prevented an Austrian Hercules from landing and for a short while,
French and Austrian forces were cut off and exposed. See: Tonra, Ben. “The (In) Justices of Peacekeeping: EUFOR Tchad/RCA.” GLOBUS
Research Paper 3 (2018), p.11.
22 In an interesting precedent, some of these vehicles were actually bought by the United Nations and indeed the UN continues to be a buyer of
armoured vehicles. By getting UNIFIL and the UN to adopt and pay for a fleet of APCs the Maavoimat had a ready pool of vehicles in situ. Semi-
permanent overseas basing of vehicles and/or buying vehicles, perhaps through the auspices of the UN as a shared asset, are just two possible
approaches which a country like Ireland could consider in future.
27
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
deficiencies in turret protection. For these reasons it became increasingly obvious they were
not ideal. Both the Irish and Finnish army had encountered the South African RG31 mine
resistant vehicles in the Lebanon and in Eritrea which were effective in reducing casualties.
Experience in Afghanistan, where since 2002 the Finns deployed a small contingent with ISAF
under a UN mandate, offered a number of steep learning curves. In 2006, the Finnish army,
concerned about deployability23 and the IED threat, choose a much smaller (under eight ton)
light armoured vehicle (LAV) from a non-national supplier, initially just six BAe RG32M which
is a smaller development of the RG31 in some aspects24. This order was repeated in 2010 (26),
in 2011 (23) and again in 2012 (25) bringing their total fleet to well over 7025. Interoperability
with the EU Nordic Battlegroup countries may have influenced this procurement, as it’s also
used by Sweden (200 examples) and Ireland purchased 27 in 201026. It is important to note
that the RG32M is conceived of as a scout or reconnaissance vehicle, replacing the use of jeeps
or Landrovers in such roles and offering some degree of protection from shelling, ambush and
mines. However, it is not a vehicle designed for combat, lacking sufficient armour, nor is it a
proper APC or MRAP.
The Finns deployed the RG32’s in Afghanistan as soon as possible and in 2009 one of these
was hit by an IED. The crew survived, albeit injured27. If there was a complaint, apart from
cramped vehicle ergonomics28, it was that there were never enough RG32s. Widespread use
had to be made of unprotected trucks and G-Wagens alongside the older Pasi. Moreover,
by 2011 it was evident such vehicles need better ability to protect themselves if ambushed,
so manual weapon mounts/shields were procured, which are much cheaper than remotely
operated weapon stations, and simpler to maintain overseas 29.
The Irish have also deployed the RG32M overseas, in UNIFIL and UNDOF. With its
increased mine and kinetic protection, it is an ideal fit for an overseas environment. It
has been learned however that it’s important prior to deployment to adopt an holistic
approach to training for operations and maintenance to maximize mechanical reliability and
readiness. The Finns by buying different procurement batches have mechanical variations,
which challenges maintenance, notably for the older vehicles30. However, there is dedicated
Finnish maintenance company, MILORG, which provides advanced technical support for
the Maavoimat.
The contrast with Ireland is interesting, because apart from the small batch of ‘one off’ RG32M
purchased and deployed in small number, the Irish DF have consistently relied more on the
23 BAE bought up the South African firm that produced the specialised mine resistant RG31 and the RG32 was a newer, substantially different,
variant. Two RG32s fit in a Hercules transport plane. Unlike Austria, Finland does not have any of these aircraft although it has excellent C295
medium transports (a modern version of Irish Casa 235s). Yet Finland is a member since 2009 of the Heavy Lift Group, based in Hungary, which
pools a fleet of just three huge C-17 strategic airlifters and gives access to these aircraft to the members of this group 10 NATO member states
as well as Sweden.
24 See: http://www.deagel.com/news/Finland-Orders-16-RG-32M-Armored-Vehicles_n000007337.aspx
25 The costs of the final trance was estimated at €12.5m in 2012 values. See: Army Technology News, (2012) ‘Finnish Army orders additional
RG32M vehicles from BAE, 4th June’, https://www.army-technology.com/news/newsfinnish-army-orders-additional-rg32m-vehicles-bae/
26 The Irish Army variant is different.
27 Overall Finland lost 2 soldiers and had 11 wounded in Afghanistan. See: https://web.archive.org/web/20160109100128/http://news.
xinhuanet.com/english/2009-10/03/content_12178191.htm.
28 Halvarsson A., Hagman I., Tegern M., Broman L., and Larsson H. (2018) ‘Self-reported musculoskeletal complaints and injuries and exposure
of physical workload in Swedish soldiers serving in Afghanistan’, PLoS ONE 13(4), p.12
29 http://www.asdnews.com/news-44536/finland_orders_weapon_stations_for_rg32m.htm
30 Lepoaho, Jussi (2015) Millog Oy Käytettävyyden Tuottajana – Partioajoneuvo RG32M-Millog as an availability service producer-Patrol
Vehicle RG32M, Masters Degrees Thesis, Jamk University of Applied Sciences,p.20-21,
https://www.theseus.fi/bitstream/handle/10024/97287/Jussi_Lepoaho%20YAMK.pdf?sequence=1
28
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
heavier Pirhana vehicles, with the consequence that these must be either transported by sea
or very elaborate arrangements have to be made for air heavy lift. The commercial market
for outsize heavy lift aviation is dominated by Russian aircraft and companies, and given the
current EU sanctions regime in place, political risk has now made such solutions unreliable.
This nicely illustrates how procurements are interlinked: because Ireland has invested in a
Pirhana fleet as the primary vehicle for peacekeeping deployments, this makes a dedicated sea
mobility solution the most logical and economic way of transporting the 14 Pirhanas typically
required for an Irish infantry company. The Finns have other options because of their ‘share’
in the Heavy Lift Wing and because they have more than enough lighter RG32s to equip
an entire company element if they chose to. New Zealand’s Defence Force has the option of
transporting large number of Pirhana sized vehicles on their Canterbury and they even have a
few Hercules as well.
31 At the time of writing Ireland had an open tender process for replacement aircraft for the CASA235s. See: https://www.oireachtas.ie/en/
debates/question/2019-02-20/81/
32 At Para.6.5 Department of Defence. White Paper on Defence. Dublin, DoD, 2015. Available at: https://www.defence.ie/system/files/media/
file-uploads/2018-06/wp2015eng_1.pdf
29
Small States’ Capability Enhancement for Peacekeeping:
What can Ireland learn from other countries?
very positive Irish development is the commitment in the Irish White Paper on Defence (2015)
to develop a funding model study that facilitates long-term planning and financing for life-cycle
procurement and updates33.
Overall, these case studies taken together reinforce the need for joint capability enhancement-
allowing land, air and sea elements to combine and understanding the interactions between
them. To be effective land units need mobility and air and sea assets confer this in different
ways, but equally the protection offered by hardened land forces is essential if ships are to dock
and aircraft to land.
All three examples are vehicles of some type, and this paper has not studied weapons
procurement, or the many other essential items of equipment modern peacekeepers require.
Nonetheless it should be evident that a balance needs to be found between procuring for force
protection and investing in capabilities that will permit defending civilians and the ability to
enforce mandates flexibly.
Finally, all of these cases show small states can be ambitious, creative in their thinking and
flexible in their actions. Moreover, the clearest lesson perhaps is the importance of national
political ambition to resource peacekeepers as best as they can. Even though Finland, Austria
and New Zealand have actually lower levels of GNI per capita than Ireland34, they have all
found the required funding to purchase new capabilities that improve their peacekeeping
presence in the world. Has Ireland’s public and political leadership demonstrated that same
level of support for ambition, creativity and flexibility in equipping our Defence Forces?
30
“Relying on the goodwill of the
individual, and luck”
The Problematic Nature of Utilising
The Army Reserve Skills Base in The
Single Force Concept.
Jonathon Carroll
Texas A&M University, a United States Senior Military College
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
Abstract
Recently, the role of reservists, particularly in the Communications Information Systems
(CIS) Corps, in developing and enhancing technological solutions through the application
of skills gained from civilian careers and educational qualifications has yielded interesting
results. While showcasing the potential contributions reservists can make, such results
should not be mistaken as capability-building, nor of the long-awaited harnessing of skills
to the Permanent Defence Forces that reservists possess. Reservists in the CIS Corps
have made excellent strides in technological innovation. However, such strides have only
been made possible by a combination of the goodwill of these individual reservists, and
luck. The example of the CIS Corps is the exception, not the rule. The Army Reserve
by reason of legislation, and structural organisation is largely prevented from enabling
the meaningful application of reservists’ skills in technological innovation or in any area
of specialisation beneficial to the wider Defence Forces. This paper draws on research
conducted into the Army Reserve and the Single Force Concept to argue that there
are significant obstacles preventing the Permanent Defence Forces from absorbing the
skills base provided by the Army Reserve. Consequently, far from capability-building, any
lasting application of skills in areas including technological innovation and development
is almost impossible. In making this argument, this paper will examine factors enabling
reservist skill contribution, including the example of the CIS Corps, but will also suggest
that the current force structure, and organisational practices governing the Army Reserve
prevent the efficient use of reservists’ skills. Furthermore, the legislation surrounding
service in the Army Reserve will also be examined to highlight the problematic nature of
retaining skilled reservists, or even utilising skilled personnel where necessary. Finally,
the Irish model will be compared briefly with international best practice. Any debate
surrounding a 22nd Century military must acknowledge that in the Irish context, the
mechanisms of utilising reservists’ skills, are fundamentally outdated.
Introduction
In 2015, reservists in the CIS Corps developed a system of transmitting encrypted video and
audio data via mobile phone signals. The system was tested for operational viability with the
Nordic EU Battlegroup and was due to be used by the Irish contingent of the German-Austrian
Battlegroup in 2016.1 However, legislative barriers to reservists serving overseas meant the
personnel who designed, and were best suited to operate this system, could not participate in
the mission readiness exercise in Germany.2 Their professional innovation, developed outside
the Defence Forces, showcased both what reservists can contribute to the Defence Forces and
the practical limitations of their engagement.3 Reservists in the CIS Corps, however, are the
exception, not the rule. In the age of growing cyber threats, the CIS Corps, arguably the corps
with the most potential in harnessing reservists’ skills, fell afoul of the reality that, for many
reasons, the Defence Forces cannot effectively harness the specialised skills reservists possess.
32
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
Employer Engagement
The problem could be eased, not solved, with meaningful employer engagement. Liaising with
employers to facilitate reservists attending training and committing their skills to the Defence
Forces was suggested in 1999.7 After 20 years, the only output of employer engagement is the
Reserve Defence Forces Employer Information Booklet, published in 2016. This merely encourages
employers to look kindly on reservists by granting annual or unpaid leave to attend training.
There is no mention of reservists being called up in an emergency, or that a skilled reservist
4 Ministry of Defence, Reserves in the future force 2020 (London: Ministry of Defence, 2013), p.73.
5 The Defence Act 1954, s.87 and s.90.
6 Reservists are neither employees nor workers of the Department of Defence, they are classified as “volunteers.” Dail Eireann 22 Apr. 2008,
parliamentary debates; official report, vol. dclii, 2008 [no.2] (Dublin, Stationary Office). Furthermore, unlike members of the PDF, section 118
of The Defence Act 1954 states that reservists are only under military law, and subject to military discipline whilst in uniform. Moreover, section
243 of the same Act states that if a reservist fails to report for duty they can be charged with desertion or being absent without leave which
only incurs a monetary fine as opposed to a custodial punishment. But, even if a reservist commits this offence they must present themselves, in
uniform, to be charged. Therefore, theoretically, if an individual simply does not present themselves they will not be punished. Lt. Col. B (PDF),
interviewed by author, January 2016.
7 Department of Defence, Report of the steering group on the special study of the Reserve Defence Force (Dublin: Government Press, 1999),
p.5.
33
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
might be required by the Defence Forces for an extended period due to their expertise.8 Despite
considerable work putting it together, the handbook does not tackle the problem at all. It
assumes compliance and cooperation at all levels from employers without incentive, or an
established tradition of cooperation. Other countries, such as Britain and America, that enjoy
a strong societal martial tradition have nevertheless resorted to legislation to guarantee this
cooperation.9 That skilled individuals might be required by the Defence Forces may become
a real possibility, indeed an opportunity for the Army Reserve, given the current personnel
retention crisis. By failing to mention this, employers, who could have been geared up for the
possibility years ago may consider the last-minute request for their employee to be absent for an
extended period to be more trouble than it’s worth. For their part, the committed reservist may
be forced to choose between their sense of duty, and their employment.
The suggestion of employment protection legislation has been made consistently by those
arguing the tangible benefits for the Defence Forces. In contrast, others argue such legislation
is a “double edged sword” with the potential consequence of employers not hiring reservists
due to their military obligations.10 Justifying this is the reality that, despite Ireland’s anti-
discrimination laws, there are still cases where discrimination, based on gender for example,
still occurs.11 Nonetheless, such legislation would protect, at most, 3,869 personnel in the
Army Reserve if at full strength. Illegal discrimination, were it to occur, would likely affect
only small number of reservists, who would have legal redress. On balance, the decision lies
between providing a credible Reserve with a pool of skilled personnel, and, avoiding instances
of workplace discrimination. Thus far, there has been no appetite to amend legislation as it has
been argued that there has never been the need to deploy the Reserve.12 This ignores the large
FCA deployments to the border during the Troubles, the regional deployments during the
2015 Shannon flooding and future possible contingencies arising from Brexit.13 The double-
edged sword cuts both ways as the government and Defence Forces are deterred from using
the Reserve because reservists, in reality, can choose not to report for duty.14 No system exists
to compel or incentivise them to do so, and a material benefit to not contributing their skills
exists in the form of keeping their job, and being paid adequately for their time.
8 Department of Defence, Reserve Defence Forces Employers Information Booklet (Dublin: Department of Defence, 2016).
9 In the British Army Reserve, the Reserve Forces Act 1985 guarantees a reservists’ employment if deployed. Furthermore, any employer who
loses an employee due to overseas deployment with the Reserve is paid compensation by the government to offset any loss suffered and to
facilitate the employment of a temporary replacement. Ministry of Defence, ‘Rights and responsibilities for reservists and employers’ (https://
www.gov.uk/employee-reservist/financial-support-for-employers) (4 Jul. 2016). In the United States, the Uniformed Services Employment and
Reemployment Rights Act 1994 prohibits any discrimination or reprisals against members of the National Guard or the Reserve forces either in
terms of being employed, or for being deployed. The Act dictates that reservists deployed overseas shall not suffer in their civilian employment as
a result of having to serve. As such, in the event of deployment a reservists’ position is guaranteed to be waiting for them upon their return with
no loss of pay or career potential. The Act guarantees employment as if the deployment never occurred.
10 Lt. Col. C (PDF), interviewed by author, January 2016.
11 Main Political Party T.D. H, interviewed by author, April 2016.
12 Main Political Party T.D. H, interviewed by author, April 2016.
13 Beginning in 1969 the FCA provided garrison duties for a PDF that required time and the establishment of three new infantry battalions to
adequately secure the border with Northern Ireland at the outset of the Troubles. This resulted in the formation of the 27th, 28th and 29th PDF
Infantry Battalions; John P. Duggan, A history of the Irish Army (Dublin: Gill & MacMillan, 1991), p.281. Reserve personnel from 1st, 6th and
12th Infantry Battalions along with elements of 1st Brigade Transport Company were utilised in flood relief efforts in 2015. Mr. Neil Richardson,
General Secretary RDFRA, interviewed by author, May 3, 2016.
14 Lt. Col. B (PDF), interviewed by author, January 2016.
34
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
15 The Defence (Amendment) Act 1960, the Defence (Amendment) Act 1993 and the Defence (Amendment) Act 2006 which legislate for the
participation of Defence Forces personnel in UN peacekeeping missions, peace-enforcement missions and EU Battlegroups respectively all
specifically state that such service is for members of the “Permanent Defence Forces,” not reservists.
16 Joel D. Rayburn and Frank K. Sobcjek, The US Army in the Iraq War: Volume 1 (Carlisle: United States Army War College Press, 2019),
p.260.
17 Department of Defence, White Paper on Defence 2015 (Dublin: Department of Defence, 2015),p.100; Department of Defence, Report of the
steering group on the special study of the Reserve Defence Force (Dublin: Department of Defence, 1999), p.1.
18 In 2009 a training syllabus was completed to allow reservists deploy to Kosovo with KFOR. The PDF was looking for doctors, engineers,
medics, drivers, tradesmen and radio operators. The RDF Overseas Integration Course was to be a two-month upskilling course in CIS, CBRN,
tactics, weapons handling, helicopter operations and unarmed combat. As mentioned the first issue with reservists deploying overseas is a
legislative one and no amendments were made. Therefore, the plan was to enlist reservists into the PDF, thus legalising their deployment, for a
one-year contract. Problematically, this contract amounted to obtaining the services of professional specialists for the lowest cost possible with
no employment protection. Suitable reservists, who applied for overseas, regardless of their rank, were to be enlisted into the PDF at the rank
of 2-Star Private and paid the equivalent wage. Unsurprisingly, there was a lack of volunteers with the desired professional qualifications and
plans for reservists serving overseas were shelved in the financial crisis. Irish Defence Forces, TS RDF INF XX/2009 RDF overseas integration
course syllabus of training (Dublin: Defence Forces Training and Education Directorate, 2009); Directorate of Reserve Forces, Letter seeking
expressions of interest for overseas service (2 Sep. 2008); Reserve Defence Forces Representation Association, Press release pertaining to the
cancellation of overseas service for the RDF (undated, 2009).
19 Commandant D (PDF), interviewed by author, January 2016; Lt. Col. B (PDF), interviewed by author, January 2016.
35
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
3000
1507
2000 1260
277 262 209 202 113 246
1000 413
169 93 72 72 47 133 27 114 8 41 40 87 61
0
Infantry Artillery Cavalry Engineers Military Medical CIS Transport
Police
FCA Discharged Post 2005 RDF Discharged 2006-2012 SFC Discharged 2013-2015
36
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
units managing their recruit training.21 After two years infantry training, skilled specialists
still can’t do the job they, and the Defence Forces want them to do. Despite being qualified
professionals, conversion courses must then be completed in relevant corps-specific areas. For
some roles this makes sense, for others the system is inefficient. The Transport Corps provides
a working example.
Reservists cannot carry out mechanical vehicle maintenance, despite a shortage of qualified
mechanics in the PDF and many reservists being qualified civilian mechanics.22 If a civilian
articulated truck driver joins the Reserve no mechanism exists for a direct conversion to the
equivalent military qualification.23 The reservist must complete two years part time infantry
training to reach 3 Star-Private just to be eligible for military standard driving courses. The
equivalent military truck licence requires the further completion of three driving courses,
taking another 18 months to complete if said reservist has had no problematic issues with
their civilian employer. Consequently, for a professional truck driver to do the same job for
the Defence Forces takes between three and four years, if the reservist can attend two weeks of
FTT on a yearly basis. CIS Corps reservists cannot qualify as radio technicians despite there
being a shortage in the PDF and there being a demonstrated talent pool of reservists who either
already have the skills or could be trained.24 If it takes three to four years for a truck driver on
the outside to drive a truck on the inside, then what is the conversion timeframe for other
professional skillsets? A tangible opportunity is being missed here. Some roles could be filled by
direct-entry commissions, but every skilled reserve applicant cannot simply be made an officer.
For the various reasons set out above, a fundamental question must be posed. Is it efficient to
maintain this force structure or organisational practice? Reserve combat elements are prudent,
but with a shortage in the PDF of radio technicians, vehicle mechanics, doctors, air traffic
controllers and cyber-security specialists to name but a few, a clear argument exists for change.
Reducing the reserve personnel allocation to combat units in CS4 and increasing the allocations
to specialist units would allow the Defence Forces a bigger net to catch skilled individuals
willing to contribute their expertise. Supporting this argument is the Medical Corps. A 2009
review of medical capabilities found that the Medical Corps could only meet 40% of the needs
of the Defence Forces, not including reserve requirements. The review recommended looking
to the Reserve medical component to alleviate this. 25 At that time the Medical Corps had 226
reservists in three reserve medical companies.26 The 2013 Single Force Concept reduced that
Reserve medical component to just 32 personnel. The recommendations of the review were
ignored, leaving the Defence Forces with just 32 spots, instead of 226, for medical specialists or
doctors to fill. Personnel Management System (PMS) data clearly shows that specialist reserve
units have higher personnel retention rates compared to the combat units, where the reserve
21 Pesonnel Management System (PMS) Data for recruitment shows that from the inception of the Single Force Concept in 2013 to 2015 there
were 461 new recruits to the Army Reserve, they were assigned as follows: The Engineering, Medical and CIS Corps’(one recruit each), the
Transport Corp (two recruits), the Cavalry Corps (eleven), the Artillery Corps (seventy-eight) and the Infantry Corps (366 recruits). This is despite
the Infantry, Cavalry and Artillery Corps’ discharging 1,748 personnel in the same period.
22 Commandant G (AR), interviewed by author, January 2016.
23 Said individual would have to begin with a Module 2B (Nissan Jeep) course, then a Ford Transit minibus course followed by the Module
3B Truck course; Irish Defence Forces, TI 03/2011 Defence Forces driver training policy (Dublin: Defence Forces Training and Education
Directorate 2011).
24 Commandant A (PDF), interviewed by author, January 2016.
25 PA Consulting Group, Defence Forces Medical Services Review (Dublin: PA Consulting Group, 2009), p. 40-46, 97; Commandant G (AR),
interviewed by author, January 2016.
26 The 62nd, 54th and 31st Reserve Logistics Support Battalions headquartered in Dublin, Galway and Cork each had a medical company
within the battalion.
37
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
infantry component is unable to hold on to personnel.27 This suggests that where reservists can
bring, and apply, their civilian skills in the military, they stay longer than if they have nothing
to bring to the table. There is no real civilian equivalent for infantry, artillery or cavalry. For
military logisticians, medics, combat engineers and communications specialists, there is. This
should be capitalized upon.
3000
1507
2000 1260
277 262 209 202 113 246
1000 413
169 93 72 72 47 133 27 114 8 41 40 87 61
0
Infantry Artillery
Cavalry Engineers Military Medical CIS Transport
Police
FCA Discharged Post 2005 RDF Discharged 2006-2012 SFC Discharged 2013-2015
28
This brings up the cultural view of the Army Reserve by the Defence Forces, with varying
attitudes among PDF unit commanders towards the Reserve. Some believe it unreasonable to
expect personnel, with many external commitments, to work for free with no supporting legal
framework.29 The Medical Corps does not have the capacity to meet the needs of the Defence
Forces, yet reserve medical officers cannot be utilised to alleviate this as they would be unwilling
to perform a military function for free that they are paid for in a civilian capacity.30 Others
argue reservists don’t “join for the money” and want to get away from their civilian jobs to do
something different.31 If the Defence Forces hope to recruit specialist skills, then expecting
those skills for free is, at a minimum, optimistic. Furthermore, specialist units maintaining
better strength levels argues that reservists join specifically to use their skills, not get away from
them. Some argue that the Defence Forces does not buy into the potential of the Army Reserve
and fails to assess the broad skill base reservists have.32 This is hard to dispute. The suggestion
of a comprehensive survey of reservists’ skills and qualifications was made in 2003.33 To date
no comprehensive survey has ever taken place.34 Consequently, the Defence Forces does not
actually know who, what or how many skilled personnel the Army Reserve has
27 PMS Data records that in the 2005-2015 period the reserve infantry component recruited 4,346 new recruits but discharged 10,725
personnel.
28 PMS Data shows that in the wake of the 2005 reorganisation from the FCA to the Army Reserve, 4,761 FCA personnel were discharged
over time from the Defence Forces. PMS Data does not explain why these personnel did not transition into the Army Reserve. Many local FCA
posts were closed with the 2005 reorganisation due to the smaller organizational size of the new Army Reserve, this may explain some of
the personnel not continuing their service. A further 7,979 personnel were discharged from the Army Reserve between 2006 and the 2013
reorganisation to the Single Force Concept. Post Single Force Concept to 2015 an additional 1,931 were discharged for a total of 14,671
discharges between 2005 and 2015 with an average of 1,467 personnel per year.
29 Commandant F (PDF), interviewed by author, January 2016.
30 Lt. Col. J (PDF), interviewed by author, January, 2016.
31 Lt. Col. C (PDF), interviewed by author, January 2016.; Commandant E (PDF), interviewed by author, January, 2016.
32 Commandant K (PDF), interviewed by author, March, 2016.
33 Department of Defence, Department of Defence and Defence Forces strategy statement 2003-2005 (Dublin, Department of Defence, 2003),
p.10.
34 Mr. Neil Richardson, General Secretary RDFRA, interviewed by author, June 14, 2019.
38
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
to offer. Such data, quite easily obtained, should be the guiding principle behind designing the
force structure of the Reserve.
International Best-Practice.
Other militaries have tackled this problem in every way that Ireland has not. Legislation in New
Zealand, Canada, Australia, the United Kingdom and the United States guarantees a reservists’
employment if deployed.35 Failure to report for duty can result in periods of imprisonment.36
Punitive impetus to report for service, coupled with legislative support, allows these nations
to have a usable reserve skills base. There is also no “voluntary unpaid training” as all reserve
service is incentivised, and in some cases pensionable.37 The Irish Army Reserve, by comparison,
has none of these enablers.
Ireland New Zealand Australia Canada UK United States38
Furthermore, in terms of force structure, these other reserve forces are designed to harness
significant amounts of specialist skillsets in areas such as medicine, military intelligence, cyber-
security, engineering and logistics. This allows the regular armies to benefit from the professional
experience gained by civilian employment in specialist areas, via their reserves. While the
Canadian Army Reserve is primarily combat oriented, almost half of the Australian and New
Zealand Army Reserves are combat service support units. This reflects an acknowledgement
of what the regular army needs in terms of skills, thus allowing reserve forces to act as force-
multipliers. Tipping the scale completely in favour of specialist skills, the American National
Guard and Army Reserve combined have more medical, engineering, military intelligence, and
logistics units than the regular US Army. For the British, most of their medical establishment
is also in their Army Reserve, along with almost half of their intelligence and logistics units. In
both the American and British forces, there are almost twice as many specialist units compared
to combat formations of equal size. Legislatively, and organisationally, the Irish Army Reserve is
out of step with international best practice. Ireland may be neutral, while these comparators are
35 The relevant legislation is as follows, The Defence Act 1990 (New Zealand), The National Defence Act 1985 (Canada), The Reserve Forces
Act (UK), The Defence Reserve (Protection) Act 2001 (Australia) and the Uniformed Services Employment and Reemployment Rights Act 1994
(United States, applying equally to the Army National Guard and the Army Reserve).
36 All pieces of legislation noted above dictate custodial penalties relevant to that country’s military or civil law.
37 All training nights and weekends are fully paid, as are any travel expenses incurred due to reserve service. Furthermore, in the British model
reservists are paid a bounty, similar to the Irish gratuity scrapped in 2012, for attaining set annual training obligations with the bounty increasing
incrementally every year. There is also a pension contribution for reserve service. Ministry of Defence, Rates of Pay 2015 (London: Ministry of
Defence, 2015). Ministry of Defence, Reserves in the Future Force 2020: Valuable and Valued (London: Ministry of Defence, 2011), p.8.
38 The United States Army reserve component is a combination of the Army National Guard, which focuses primarily on providing combat units
in the form of Brigade Combat Teams with some Combat Support units, and the United States Army Reserve which primarily focuses on Combat
Service Support.
39
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
not, but neutrality does not matter. Security environments merely dictate the size of military
forces, and the priority and division of contingent capabilities within those forces. However,
regardless of neutrality, all modern militaries strive to develop and retain contingent capabilities,
the only difference is the matter of scale. The Defence Forces should be no different.
The Reality
Conceptually, the British Future Reserves 2020 policy argues, “if Defence routinely asks more
than reservists or employers can reasonably give, then it is unlikely that Defence will have the
reservists needed to deliver an assured contribution to national security.”39 Data suggests that
the Irish Army Reserve has consistently asked more than reservists’ can give. Without legislative
support, meaningful employer engagement, and an ever-increasing emphasis on unpaid service,
14,671 reservists were discharged between 2005 and 2015.40 In 2013, when the Single Force
Concept was launched the effective strength of the Army Reserve was 3,410 personnel. By the
end of 2015, it was 2,434. In January 2019, it was just 1,620.41 With an establishment of 3,869,
the Army Reserve teeters at circa 30% strength or less.42 Clearly, reservists have voted with their
feet. In addition, any unit commander will admit the big difference between effective strength
and reservists on parade. The reality is, the Reserve may stand at 20-25% strength. A record
low numerically, proportionally and historically. It should be noted that, of the 1,620, 313 were
recruits or 2-stars, with another 626 being aged 45 or older.43 This is the result when relying
solely on the goodwill of the individual.
39 Ministry of Defence, Reserves in the future force 2020 (London: Ministry of Defence, 2013), p.28.
40 Irish Defence Forces, PMS Reports on annual discharges 2005-2015. PMS Data shows that in the wake of the 2005 reorganisation from
the FCA to the Army Reserve, 4,761 FCA personnel were discharged over time from the Defence Forces. PMS Data does not explain why
these personnel did not transition into the Army Reserve. Many local FCA posts were closed with the 2005 reorganisation due to the smaller
organizational size of the new Army Reserve, this may explain some of the personnel not continuing their service. A further 7,979 personnel were
discharged from the Army Reserve between 2006 and the 2013 reorganisation to the Single Force Concept. Post Single Force Concept to
2015 an additional 1,931 were discharged for a total of 14,671 discharges between 2005 and 2015 with an average of 1,467 personnel per
year.
41 Mr. Neil Richardson, General Secretary RDFRA, interviewed by author, June 14, 2019.
42 Defence Forces Regulation R5, the regulation governing the Army Reserve, an “effective” reservist merely has to attend a minimum of 24 two-
hour unpaid training nights, or 48 cumulative hours made up of training nights and training weekends annually. Personnel not achieving this are
categorised as “non-effective” and ultimately discharged. Attending paid training to be classified as effective is not a requirement. Undoubtedly
a reservist who has attended paid, full time training periods, in conjunction with the obligatory 48 hours is a higher trained soldier than one who
has only met the 48-hour minimum requirement. Thus, the effective strength is indicative of the quantitative, not qualitative strength of the force.
43 As of January 2019, the average age of a reserve Captain or Lieutenant was 50 and 44 years old respectively. In terms of non-commissioned
officers, the average age of a Sergeant was 49, and a Corporal, 39. Mr. Neil Richardson, General Secretary RDFRA, interviewed by author, June
14, 2019.
40
“Relying on the goodwill of the individual, and luck”
The problematic nature of utilising the Army Reserve skills base in the Single Force Concept.
44 The FCA numbered less than 25,000 when it was integrated with the PDF in 1959. Integration resulted in FCA units having regular army
commanders and training staff attached to each unit to provide the Irish Army with six integrated brigades of regular and reserve personnel. After
separation from the PDF in 1979, the FCA had a revised organisational establishment of 22,110 personnel. John P. Duggan, A history of the
Irish Army (Dublin: Gill & MacMillan, 1991), p.238.
41
42
REMOTELY PILOTED AIRCRAFT
SYSTEMS:
A Threat Analysis for the Irish Air Corps
Capt Kevin Fitzgerald
No. 3 Operations Wing, Air Corps.
Capt James Northover
No. 1 Operations Wing, Air Corps.
Lt David Finnegan
Maritime Surveillance and Airlift Squadron,Irish Air Corps
Dr Sharon Feeney
Head of Learning Development, College of Business,
Technological University, Dublin.
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
Abstract
Remotely Piloted Aircraft Systems (RPAS) are the next generation of field aviation. They
have emerged in recent years and are proving to be more accessible, and more flexible
than traditional crewed aircraft.
The industry is in its infancy, and it is clear that the required controls have not kept pace
with the rapid expansion of the market. Legislation has only emerged in the past couple
of years. Many national aviation authorities around the world are still without strict rules
to control their use. The methods of preventing, protecting and intervening in the misuse
of RPAS are equally primitive. These elements combine to create an environment where
the next generation of aviation is posing a real threat to the current generation.
This study is the first of its kind to be conducted in Ireland. It provides a brief overview
of literature, along with findings from a questionnaire that was distributed to all pilots,
aircrew and air traffic controllers in the Irish Air Corps (IAC), which provided insights
into the extent to which RPAS poses a threat to the current and future flight operations
of the IAC.
The results of this study show that the international, national and IAC regulations
governing RPAS are insufficient. Flight statistics have shown a rapid acceleration in the
number of incidents involving RPAS.
Introduction
The issue of civilians using drones near civilian and military aircraft is an emergent issue for
pilots. This paper will examine the threat that these drones [also known as Remotely Piloted
Aircraft Systems (RPAS)] pose to aviation. The RPAS referred to in this study are operated by
civilians and are primarily comprised of a small electric motor powering a number of rotors,
and are piloted using handheld remote control devices or mobile phones. They are generally
small in size and are used for short distance operations, for example for aerial photography,
filming, conservation, and other missions. At present RPAS operate exclusively in airspace that
is segregated out for them. The operators of RPAS tend not to be professional aviators or even
aviation enthusiasts. This paper is the first to assess the levels of education and awareness of
RPAS among flight crews in the Irish Air Corps.
Context
Legislation has struggled to keep pace with the rapid expansion of emerging technology and
in the case of RPAS technology, regulation has been slow to appear. The majority of academic
research in this area has been carried out in the US although it is argued that1, the Federal
Aviation Authority (FAA) are “seriously behind” in the race to implement useful legislation.
Sanz et al. 2 take the view that the legislation required can only be reactive, and cannot have the
capability of controlling operators in the same way as manned aviation. They suggest that the
burden of regulation needs to fall on the manufacturers as it is a futile exercise to attempt to
1 Perritt, H. H. and Sprague, E.O. (2014). RPAS. Vanderbilt Journal of Entertainment and Technology Law, 17 (3), 672 – 749.
2 Sanz, D., Valente, J., del Cerro, J., Colorado, J., & Barrientos, A. (2015). Safe operation of mini UAVs: a review of regulation and best practices.
Advanced Robotics, 29(19), 1221-1233
44
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
maintain absolute control over the skills of individual operators. It is inevitable that there will
be malicious or incompetent people who will misuse drones, which may ultimately threaten
aviation safety. This potential is exacerbated greatly by the fact that the operators of drones
are not exclusively aviation enthusiasts or hobbyists, and are far more likely to be casually
uninformed or uninterested in flight safety. So the balance must be restored by focusing on the
regulation of the aircraft. The authorities cannot be sure whether an operator will transgress,
and therefore every effort must be made to ensure that the drone itself cannot transgress3.
RPAS use has not yet been studied in an Irish context so a series of questions are considered in
this paper in order to provide some insight into the Irish experience to date.
Methodology
This study seeks to ascertain the extent to which RPAS use is a threat to IAC flight operations.
Consequently there are three main research questions identified:
1. To what extent are RPAS a threat to flight safety in IAC?
2. To what extent is national and international legislation sufficient to protect IAC flight
operations in the area of RPAS?
3. Are IAC personnel sufficiently educated on the capabilities and threat potential of RPAS
with respect to flight safety?
Given that the interaction between piloted and remote aviation affects all aircrew involved
in the safe execution of flight operations, it was decided to administer a questionnaire to all
pilots, helicopter crew and air traffic controllers employed in the Irish Air Corps. The decision
to include pilots is obvious given the high likelihood that they would encounter RPAS in their
flying careers. Helicopter crew were chosen given the nature of their role in helicopter flight
operations: they are responsible for keeping the helicopter free from all obstacles and other
traffic when the helicopter is being operated in confined spaces away from the controls and
protection of airports. Air Traffic Controllers are also responsible for the separation of all air
traffic and provide an advisory role to aircraft of anything that has the potential to impact the
flights safe execution. The questionnaire response rate is provided in Table 1 below.
Specialisation Distributed Responses % of Respondents
3 Ibid., 1221-1233.
45
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
Findings
The findings of the study are presented below with each research question is taken in turn.
To what extent are RPAS a threat to flight safety in IAC?
Findings from the survey suggest that RPAS poses a significant threat to flight safety in IAC.
Question number 12 in the Survey asked “In your opinion do RPAS pose a credible flight
safety threat to IAC flight operations?” 95% of those surveyed agreed that RPAS pose a threat
to flight safety in the IAC (see figure 1 below). The survey participants have a direct exposure
to airborne threats in the course of flight operations, and therefore have a personal stake in
the outcome of this study. Furthermore, the participants in the survey are privy to aircraft
flight safety reports, and conduct annual courses that encourage the development of an
organisational culture that promotes flight safety. This may engender a more cautious and
conscientious attitude to the threat of RPAS to Irish Air Corps Flight operations.
The research also looked the perceived ability of Air Traffic Control (ATC) to mitigate against
the threat that RPAS poses. Question number 13 asked, “Do you regard our ATC service as being
in a position to mitigate against the threat that RPAS may pose to flight operations?” It is interesting
to note that only 24% of personnel participating in the survey believed that ATC was in a
position to protect flight operations from the RPAS threat. Question 14 “Do you think the
IAC have adequately mitigated the risk RPAS may pose to flight operations?” shows that over 40% of
respondents do not believe that IAC have adequately mitigated against the risk RPAS might
pose to flight operations. Question 15, “Considering the recent rise in nuisance laser attacks on IAC
aircraft, do you foresee RPAS being utilised in a similar way to hinder or endanger flights?” shows that
RPAS is perceived to be a growing threat to flight safety, with over 70% agreeing that RPAS is
foreseen as having the possibility to be utilised to hinder or endanger flights.
To what extent is the national and international legislation sufficient to protect IAC
flight operations?
At the time of completing the survey, new rules and regulations were being finalised by the
Irish Aviation Authority. These were well publicised in the national media and will likely have
influenced the responses to question numbers 16, 17 and 18. Question 16 asked, “Do you agree
that An Garda Siochána are fully aware of the industry of RPAS in this country?” More than half of
46
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
the respondents answered ‘no’ to this question, with less than 20% reporting that they believe
that An Garda Siochána are fully aware of RPAS (see Figure 2 below). This is significant in
the context of upholding some of the regulations for users, and the likelihood of members
of An Garda Siochána to initiate prosecution for non-compliance and endangering citizens.
Similarly, question 17 asked, “Do you agree that An Garda Siochána are adequately prepared to
protect the airspace from RPAS operators on the ground?” Again, the majority of respondents (80%)
answered ‘no’ to this question. This is interesting in the context of the Garda Air Support Unit
(GASU), which is a helicopter unit comprising members of An Garda Siochána and piloted
by IAC personnel that operates from the IAC Baldonnel base. All helicopter operations are
carried out at a low level and in urban environments where RPAS usage would be higher. Only
6% of respondents agreed that An Garda Siochána are adequately prepared to protect the
airspace (see Figure 2 below)
100%
80%
60% YES
NO
40%
OTHER
20%
0%
Q16 Q17 Q18
Figure 2: Responses on awareness and assessment of legislation
Question 18 asked, “do you believe, from a base security perspective, a specific set of orders should
be drafted in order to protect IAC aircraft from the potential threat of RPAS overflying the airfield
boundaries?” This is a salient sample, given that the personnel responding to the survey have
a direct responsibility for the security of the base, in the normal course of their duties. The
sample are, therefore, fully aware of the challenge of maintaining adequate security at all times.
It is interesting therefore, that 87% respondents agreed that a specific set of orders need to be
created in order to address the emerging threat of RPAS being used for malicious purposes or
in an illegal manner, and in such a way as to contrive the safety of IAC. See Figure 2, above.
This finding has implications for other Defence Forces establishments throughout Ireland, as
each premises must maintain adequate security at all times.
Are IAC personnel sufficiently educated on the capabilities and threat potential of
RPAS with respect to flight safety?
The topic of education provided the most definitive findings in this study, with very little
division of response. Question 19 in the survey asked, “In your opinion is there sufficient education
currently being provided to personnel in your current role in relation to RPAS?” A particular focus of
this study was to examine whether personnel believed the information currently being supplied
on RPAS and the growth of the industry in Ireland was at the appropriate level required.
The overwhelming majority felt that the current level of RPAS education being supplied to
47
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
personnel was inadequate, with only 13% of respondents indicating that it was sufficient and
some 80% of respondents answering ‘no’ to this question (see Figure 3, below).
100%
80%
60% YES
NO
40%
OTHER
20%
0%
Q19 Q20 Q21 Q22
With regard to the suggestion that more formulaic RPAS training be instituted in the IAC, the
results were very clear. In answer to Question 20, which asked, “The IAA has proposed that An
Garda Siochána deliver a module on RPAS to new entrants training in Templemore. Do you think that
the IAC would benefit from incorporating such a module into Pilot, ATC, and Aircrew initial courses?” A
resounding 98% of respondents agreed that RPAS education should be incorporated into the
initial training of the pilot; aircrew and ATC courses (see Figure 3 above). Questions 20 and 21
dealt with issues relating to the knowledge management system in the IAC, known as ‘IKON’.
Question 20 asked “Do you agree that the Irish Air Corps would benefit from having a designated RPAS
IKON portal incorporating education, legislation and flight safety lessons learned?” and Question 21
asked, “Would you interact with such a portal if it was to be introduced?” Interestingly, over
90% of respondents agreed with both questions 20 and 21, which suggests there is an appetite
to record legislation updates and flight safety lessons learned in relation to RPAS activities (see
Figure 3 above). This finding has implications for other Defence Forces components and for
their premises throughout the country, and it raises an important matter that could warrant
further research.
Eight questions in the Survey were dedicated to ascertaining the level of awareness of RPAS in
the IAC, these are summarised in Figure 4, below. Question 4 in the Survey asked “Have you
ever witnessed an RPAS operating in your airspace during the course of your career?” and, question 5
asked “Have you ever heard a colleague discuss an encounter with an RPAS operating in their airspace?”.
The responses were consistent in that 34% of respondents reported having witnessed an RPAS
operating in their airspace during the course of their career (see Figure 4 below). Many of these
were helicopter pilots who operate at a lower flight level. Of the total group of respondents,
66% had heard a colleague discuss an encounter with an RPAS. Interestingly when the results
include just helicopter pilots, the number that had heard a colleague discuss an encounter with
an RPAS rose to 100%.
48
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
100%
80%
60% YES
NO
40%
OTHER
20%
0%
Q4 Q5 Q6 Q7 Q8 Q9 Q10 Q11
In relation to respondents reporting their familiarity with the RPAS industry and the emergent
regulatory requirement for RPAS in Ireland, the survey contained six questions. Question 6
asked “Do you consider yourself well informed on the RPAS industry in Ireland?” while question 7
asked “Are you aware that the IAA introduced new regulation in December 2016 in response to the rapid
growth in RPAS operators in Ireland?” Question 8 asked, “Do you consider yourself well informed on the
IAA regulation that governs the use of RPAS in Irish airspace?” Question 9 asked, “Do you think that
the IAA regulation adequately controls the use of RPAS in this country”
Of the total group taking the survey, only 29% of the group considered themselves well
informed on the current industry in Ireland. Yet despite the fact that a greater proportion
of helicopter pilots experience RPAS in flight, 36% profess themselves well informed. Some
80% of respondents reported that they were aware of the regulation introduced by the IAA in
December 2016 in response to the rapid growth in RPAS operators in Ireland, however, just
over 40% of respondents consider themselves to be well informed on the IAA regulation that
governs the use of RPAS in Irish Airspace, with just over 50% reporting a no answer to this
question (see Figure 4 above). Fewer than 30% of respondents reported that they think the
IAA regulation adequately controls the use of RPAS in this country, with 40% reporting a no
response, while just over 30% reported ‘other’ in their response (see Figure 4 above).
Question 10 asked, “Do you agree that the IAC are properly aware of the RPAS industry?” and question
11 asked “Do you regard the IAC as being adequately prepared to deal with the RPAS industry?” Some
50% of respondents reported that they agree that the IAC are properly aware of the RPAS
industry, with just under 40% reporting a no answer to this question. Finally, just over 30%
of respondents report that they regard the IAC as being adequately prepared to deal with
the RPAS industry, with less than 50% reporting a no response to this question (see Figure
4 above).
49
Remotely Piloted Aircraft Systems:
A Threat Analysis for the Irish Air Corps.
Conclusion
It is clear from the study that concerns surrounding RPAS operations is increasing in the
IAC. The data analysed in this study suggests that most Air Corps personnel are concerned
about the effects that RPAS operations can have on Air Corps flight operations. The
overwhelming concern from operators in the IAC is that RPAS pose a threat to flight safety.
The questionnaires directly highlight the high level of concern that IAC personnel had with
regard to RPAS. The findings from this research suggest that the threat to flight safety from
RPAS is reaching a critical level. This threat is also relevant for civilian flight safety, although
that is not the focus of this particular study. Indeed, some incidents at civilian airports
(e.g. Gatwick Airport, UK in December 2018) have demonstrated the serious economic
and social consequences that an RPAS incident can have due to flight safety concerns.
It is apparent that measures are needed to combat a quickly evolving and uncontrolled
RPAS market. It is recommended that in order to mitigate the threat to IAC flight safety
a coordinated effort must occur between the IAA, IAC and An Garda Siochána. Training
modules need to be delivered to officers in the IAA, IAC and An Garda Siochána, with
inputs from all three bodies (the IAA, IAC and An Garda Siochána personnel) to ensure
that emerging regulation and legislation are fully enforced.
To what extent is the national and international legislation sufficient to protect IAC flight operations?
The issue of national and international legislation and regulation being sufficient to protect
IAC flight operations is a critical one. The majority of research in this area to date has been
focused on the legislative framework of the FAA. This paper represents the first attempt to
document the usability and efficacy of the Irish regulation. It should be noted that the IAA
were among the first regulators in the world to establish a framework of regulation around
the use of RPAS. However, the need to regulate the manufacture of RPAS is of primary
importance, if suggestions from the European Aviation Safety Agency (EASA) with regard
to geo-fencing or electronic identification are to be realised.
The conclusion from the survey was that IAC personnel are well informed about the recent
legislation and regulation regarding RPAS. However, the overwhelming opinion unveiled
by this paper is the belief that current legislation is not sufficient to protect IAC flight
operations. This may also have repercussions for civilian flight operations also. Stricter
regulations need to be implemented. In the interest of traceability it is imperative that every
RPAS needs to be registered with the IAA. This would greatly deter unauthorised usage,
while also contributing to effective policing in the event that that rules are breached. These
findings have relevance to other Defence Forces activities and premises, as well as to other
State organisations, including the IAA and An Garda Siochána. Further research into these
issues might be timely and important, particularly in the context of flight safety, airport
operations and flight operations.
50
PUSHING THE DEFENCE
TECHNOLOGY FRONTIER:
A Role for the EU?
Dr. Daniel Fiott
Security and Defence Editor, EU Institute for Security Studies
Pushing the Defence Technology Frontier: A Role for the EU?
Abstract
With the introduction of Permanent Structured Cooperation and the European Defence
Fund, much of the attention has been placed on how these initiatives can assist the EU
member states fill capability gaps and enhance defence cooperation. However, these
new initiatives also symbolise an important development in relation to the way the EU
thinks about and invests in defence technologies. This paper explores the ways in which
the EU can manage its present and future technological and capability needs.
52
Pushing the Defence Technology Frontier: A Role for the EU?
unmanned systems, sensors and data for urban combat (“SPIDER”). Furthermore, under the
EU’s preparatory investments on defence research the Union has invested up to €90 million
in technologies such as maritime surveillance, adaptive camouflage, soldier communication
systems and advanced body armour.
Although these figures may seem relatively small when compared to say the defence budget
of the United States (US) or even some of the larger EU member states, this is a radical step
forward for the Union in the area of defence. Nevertheless, the EU’s venture into defence
research and capability development raises a set of questions. First, what capabilities and
technologies should be prioritised by the EU given the fixed envelope of €13 billion under
the EDF? Second, in what measure should the EU balance investments in existing capability
shortfalls compared to emerging technology domains? Third, why does the EU need to invest
in defence capabilities in the first place and for what purpose?
5 Renaud Bellais and Daniel Fiott, “The European Defense Market: Disruptive Innovation and Market Destablization”, Economics of Peace and
Security Journal, vol. 12, no. 1 (2017), pp. 37-45.
53
Pushing the Defence Technology Frontier: A Role for the EU?
weapons in check and allows Europe armed forces to profit from high quality systems
and equipment.
This is why it is promising to see how the European Commission has crafted its first work
programme calls on the preparatory programme for defence capabilities (i.e. the European
Defence Industrial Development Programme (EDIDP)). Indeed, in 2019 the Commission
published a call for proposals for 9 key capability areas including: the protection and mobility
of military forces in areas such as counter CBRN and drones (a package worth €80 million);
intelligence, secured communication and cyber for enhanced situational awareness, early
warning and maritime surveillance (€182 million); conduct of high-end operations through
ground-based precision strike and future ground, air and naval systems (€71 million); innovative
defence technologies such as artificial intelligence, virtual reality and cyber technologies (€27
million) and a package for two PESCO projects on the Eurodrone and support for interoperable
and secure military communications (€137 million).6
Such investments prove that the Commission is thinking about future technology needs whilst
also factoring in capability gaps in the EU’s defence armoury. Such steps also recognise that if
the EU gets left behind on the defence technology curve, this will come with significant political
and military costs. First, there are already political and technological gaps opening up in NATO
between the US and Europe NATO allies. Without European capabilities, the alliance is likely
to be lopsided and the long-term invest of the US in NATO could be questioned. Second, the
strategic landscape is shifting to such a degree that even basic Common Security and Defence
Policy (CSDP) missions and operations will in the future be deployed in less permissive
6 European Commission, “European Defence Fund on track with €525 million for Eurodrone and other joint research and industrial projects”,
March 19, 2019, https://ec.europa.eu/growth/content/european-defence-fund-track-€525-million-eurodrone-and-other-joint-research-and-
industrial_en.
54
Pushing the Defence Technology Frontier: A Role for the EU?
environments characterised by the existence of third powers (i.e. China and/or Russia in the
neighbourhood) and technological innovations (e.g. weaponised dual-use technologies such as
civil drones and cyber defence). Technology is one way for the EU to offset waning asymmetry
in parts of the world if thought were permissive for European forces.
7 “Shared Vision, Common Action: A Stronger Europe – A Global Strategy for the European Union’s Foreign and Security Policy”, June 2016,
http://eeas.europa.eu/archives/docs/top_stories/pdf/eugs_review_web.pdf.
8 See this glossary of terms for the full list of tasks: https://eur-lex.europa.eu/summary/glossary/petersberg_tasks.html.
9 This is otherwise known as the ‘mutual assistance clause’ and it states: ‘If a Member State is the victim of armed aggression on its territory, the
other Member States shall have towards it an obligation of aid and assistance by all the means in their power...’
10 This is otherwise known as the ‘solidarity clause’ and it states: ‘The Union and its Member States shall act jointly in a spirit of solidarity if a
Member States is the object of a terrorist attack or the victim of a natural or man-made disaster. The Union shall mobilise all the instruments at its
disposal, including the military resources made available by the Member States…’.
55
Pushing the Defence Technology Frontier: A Role for the EU?
it bluntly, if the EU needs to protect sea lines of communication as stated in the EUGS does
this mean that the EU should invest in a carrier group? Or, in order to prevent Russia from
invading a non-NATO EU member state should the EU invest in a new generation of tanks?
What about the Council Conclusions of 14 November 201611 on the need to plan for close air
support; should the EU invest in stealth fighter jets? The reality is, of course, that the Union
may have to invest in all of these areas and more if it is to credibly fulfil its role as a strategically
autonomous defence actor.
The problem is that debates over what capabilities should be prioritised in an EU setting are
political – not only because EU governments want to use PESCO and the EDF to fund projects
of national interest, but because industrial interests ensure that the debate is not just about
defence capabilities but also about juste retour, technology partnerships, skills, jobs and more.
This is even more reason why the EU needs to get capability prioritisation right. This begins
with calibrating correctly initiatives such as PESCO, EDF, the Coordinated Annual Review on
Defence (CARD) and the CDP but also by having a frank discussion at the EU level about what
precisely it is the EU should strive to achieve in the defence domain.
Such a conversation is needed now more than ever. Discussions in Brussels about EU ‘strategic
autonomy’ in security and defence are sensitive and are usually seen as either duplicating or
detracting away from NATO.12 Of course, EU defence initiatives have been set up in such a
way as to reinforce the European pillar in the alliance. Yet, it is necessary that governments in
the EU develop a better sense of strategic autonomy. The US has made it plain, for example,
that it will dedicate its political and military energies to China and this means that Europeans
will have to do more for their own defence. Politically, the EU needs defence capabilities as a
way to leverage its political independence. Let us picture future scenarios where war breaks out
between the US and China or the US and Iran. In both cases, sea communication channels in
the Indo-Pacific and Strait of Hormuz could be blocked. Would the EU join the US in such
conflicts? Probably not, so who will protect Europe’s strategic interests in such cases?
Conclusion
In terms of defence, it is clear that the EU is not yet in a position to compare itself with larger
players such as the US or China. It does not appear to be the Union’s intention to “compete”
in the traditional strategic sense. Nevertheless, it is still necessary for the EU to protect the
interests of its citizens and its territory. Whether it be peacekeeping, crisis management,
border management or protecting the global commons, the Union clearly has to strive for a
certain level of strategic autonomy. The US has repeatedly called for this, but the EU does not
need Washington to remind it of its responsibilities in the area of security and defence. An
increasingly shifting global context means that the Union must fend for itself and one way of
achieving this is to ensure that Europe’s armed forces have the equipment they need now and
in the future, plus making sure that the competitiveness of the European defence industry is
safeguarded. In short, without a defence industry and capabilities the EU will struggle to secure
its objectives in a global order that is being contested by partners and new and old powers alike.
11 Council of the EU, “Council Conclusions on Implementing the EU Global Strategy in the Area of Security and Defence”, 14149/16, Brussels,
November 14, 2016, https://www.consilium.europa.eu/media/22459/eugs-conclusions-st14149en16.pdf.
12 Daniel Fiott, “Strategic Autonomy: Towards ‘European Sovereignty’ in Defence?”, EUISS Brief, No. 12, November 2018, https://www.iss.
europa.eu/content/strategic-autonomy-towards-‘european-sovereignty’-defence.
56
Pushing the Defence Technology Frontier: A Role for the EU?
Fortunately, EU member state governments have recognised this fact and this is why they have
committed to PESCO and the EDF. History will eventually tell us how far the Union was able
to push the technological frontier and its own defence, but it is clear that for the time being
there is not a minute to lose in developing defence capabilities. This means that the Union’s
institutions must continue to play a key role in overcoming national jealousies and mediating
between national capability and industrial preferences. If the EU is really going to push the
frontiers of defence technology for the benefit of its own security and defence, then difficult
choices will have to be made over what type of defence actor the EU needs to become and the
capabilities it needs to this end. Not seeing through the dramatic shifts in EU security and
defence will be too costly for the Union in the current and future global strategic landscape.
*The views contained in this paper do not necessarily reflect the views of the European Union.
57
58
BEWARE THE
BOOMERANG EFFECTS:
Western Risk Society and the Strategic
Backlashes of Military–Technological
Modernisation
Eoin McNamara
University of Tartu, Estonia.
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
Abstract
The transatlantic security partnership formed between the EU and the US has long
sought to maintain a stable international order. Changing levels of social acceptance
towards the use of military force combined with increased discord in transatlantic
diplomacy over recent years has led to fears that the Western commitment required
to maintain the military security burden that international stabilisation requires is swiftly
deteriorating. This article argues that Western governments are today confronted by
a challenging domestic-strategic contradiction. On one hand, most Western societies
continue to perceive it as crucial that the contemporary international order remains
stable. Conversely, these societies have become more risk-averse than ever before.
This has reinforced a popular reluctance towards the deployment of ground forces often
required for security management tasks. Centred on the US military-industrial complex,
social change has been an important catalyst to propel Western governments to invest
substantially in risk-efficient military technologies. This has arguably been the primary
means employed to ease this domestic-strategic predicament. Military drone technology
has revolutionised US counterterrorism policy over the past decade. While fostering
many obvious strategic benefits, this article will argue that the utilisation of this military
technology also harbours several severe strategic side effects.
60
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
for many of industrialisation’s problems, the nuclear energy option spells a significant reduction
in carbon emissions while ensuring an economically affordable energy supply. Nevertheless,
nuclear energy production also comes with the terrifying side effect that any negligence or
sabotage pertaining to its management could gravely endanger human habitation.6 The “end
of tradition” relates to the dilution of many traditional collective institutions in favour of the
greater “individualisation” of society. In earlier modernity, Western societies were structured
by a diverse set of collective institutions, including the main Christian Churches; the welfare
state; the social class-system; and organisations that promoted strong community-based social
capital. As many of these institutions have faded, social expectations now place individual
responsibility to form one’s own biography and social outlook in the foreground.7 Collective
social institutions were once the building blocks for the cohesive nation-state. This cohesion
created a relatively orderly social context that benefited governments implementing policy. The
eclecticism of today’s individualised Western societies means that government decision-making
is a more disruptive process by comparison. This is a point that holds particular resonance for
security policy. The risk society literature offers many über large-frame perspectives relating to
society’s ongoing modernisation trajectory. By narrowing the scope of this logic to the military-
technological sector, this article argues that the “dangers of modernisation” and government
policy at risk of disruption are important background factors to consider when analysing the
West’s evolving approach to the deployment of Remotely Piloted Aircraft Systems (RPAS),
alternatively described as drones.
What Beck outlines as the “boomerang effect” can provide considerable insight concerning
the unintended side effects of Western military strategy today. The “boomerang effect” is a
social condition that Will Atkinson has described as “the reacting back of risks on those who
produced them”.8 The next section will examine the Western hegemonic security burden and
the domestic-strategic contradiction created for its risk societies because of this. The article
will then develop the argument that strategic side-effects from military drone utilisation
can be identified in three important areas. First, drone strikes can create the backlash of
stronger “siege mentalities” among the non-combatant population in conflict areas. This
risks galvanising radicalisation leading to the emergence of “accidental guerrillas”. Second,
unrivalled technological superiority can produce military doctrines that depend excessively on
this advantage. As an influence on force planning, this can leave ground forces unprepared and
underdeveloped, with the “versatility” that they specialise in still crucial for effective stabilisation
operations. Third, there is an eventual risk that Western-pioneered military technologies will
later disperse at different rates to aspiring strategic competitor states and terrorist organisations
seeking to destabilise Western strategic objectives. This article’s conclusion will reflect on
emerging military technologies within the context of the security strategies of smaller states.
61
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
been transparently on display for more than a decade. While politically compelled to contribute
militarily to Afghanistan’s stabilisation, many NATO allies imposed stringent national caveats
to limit the combat exposure of their military deployments.9 This problematically exacerbated
the complexity of ISAF’s operational planning structure. Military fatality counts taken at
different intervals for ISAF routinely place the US and the UK, the missions leading states,
within the top five most affected participants. Other regulars in this bracket have included
Denmark, Estonia and the Netherlands, smaller states where a relatively low number of
fatalities can still produce a large per capita figure.10 Among NATO’s larger states, owing to
less combat exposure, France, Germany, Italy, Poland and Spain all display significantly lower
military fatality rates per capita compared to the US and the UK.11 As well as discourse around
an unfair distribution of combat risk, US perceptions stressing a European over-dependence on
US military capabilities for expeditionary operations were further galvanised after Operation
Unified Protector (OUP) in Libya.12 In 2011, US Secretary of Defence Robert Gates gave a
landmark speech in Brussels to highlight widening transatlantic ruptures. Gates warned of the
grave problem of NATO becoming a “two-tiered” alliance divided between allies that can make
a tangible military contribution and others unable to do so.13
In seeking to capture the deeper social roots shaping Western society’s increased risk-aversion
pertaining to the military burden for international security, Christopher Coker has combined
the risk society outlook with postmodern social theory. Central to this is the concept of
“liquid societies” first developed by Zygmunt Bauman.14 Just as liquids “do not hold their
shape for long”, postmodern “social bonds” are also extremely fluid. Many formative social
bonds are increasingly temporary in substance.15 The idea of “liquid alliances” fares well
to explain recent experience in NATO alliance politics. Political and military liaisons have
become increasingly flexible, with commitments undertaken on a contingent basis and long-
term strategic perspectives often conspicuously absent.16 These underlying social tendencies
illustrate a worrying pattern considering the vast range of socio-economic “public goods” that
have traditionally accumulated from the West’s management of international order.
Military power remains vital towards ensuring a stable and predictable international order.
Different military instruments are required to curb the prevalence of terrorist networks; to
reduce opportunities for transnational organised crime; and to manage the resurgence of
revisionist states orchestrating limited destabilisation for their own strategic ends.17 Should the
West disengage its military power from these functions, Richard Haass has a pessimistic view
towards the “non-polar” international order that might follow. Haass’ argument again captures
the domestic-strategic contradiction that currently confronts Western risk society. While
desired by some aspiring non-Western powers, enhanced multi-polarity will redistribute power
too chaotically within the international system. Finding the consensus required to manage
9 James Sperling and Mark Webber, “NATO: From Kosovo to Kabul,” International Affairs, 85, no. 3 (2009): 507.
10 Steve Coll, “Burden Sharing,” The New Yorker, March 11 2010, accessed September 2 2019, https://www.newyorker.com/news/steve-coll/
burden-sharing .
11 Coll, Op. Cit. For constantly updated data on NATO military fatalities in Afghanistan, see “iCasualties”, accessed September 2 2019, http://
icasualties.org/App/AfghanFatalities .
12 James M. Lindsay, “George W. Bush, Barack Obama and the future of US global leadership,” International Affairs, 87, no. 4 (2011): 779.
13 Robert M. Gates, “Remarks by Secretary Gates at the Security and Defense Agenda, Brussels, Belgium”, US Department of Defence, press
release, June 10 2011, accessed July 1 2019, http://archive.defense.gov/Transcripts/Transcript.aspx?TranscriptID=4839.
14 Zygmunt Bauman, Liquid modernity (London: John Wiley & Sons, 2000).
15 Christopher Coker, War in an age of risk (Cambridge: Polity, 2006): 20.
16 Coker, Op. Cit., 20.
17 For explanation of “limited war” as a form of destabilisation in the conflict between Russia and Ukraine, see Lawrence Freedman, “Ukraine
and the art of limited war,” Survival, 56, no. 6 (2014): 7-38.
62
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
many severe security risks will prove arduously difficult under such circumstances.18 Should
Western military hegemony decline, control will be further loosened on actors holding the
potential to destabilise international order.19 Despite the well-flagged risks that a reduction
in Western security management would likely create, the common transatlantic commitment
to undertake the responsibilities necessary for this continues to come in for doubt. “Burden-
shifting” remains a problematic practice.20
As a recent evolution of “burden-shifting” in Europe, it has been argued that once the US
stations a modest military deployment to support an allied state, populations in many of the
hosting states become less willing to commit resources to their own national defence.21 Such
attitudes tacitly portray a preference for the various risks of collective defence to be transferred to
Washington. Tense alliance politics over the thorny issue of NATO burden-sharing is not new.
Speaking in 1970, Harlan Cleveland, the US ambassador to NATO, described the alliance as
“an organised controversy about who is going to do how much”.22 However, while a prominent
transatlantic theme up until the Obama presidency, President Donald Trump’s rhetoric on
this subject has sometimes been especially abrupt and abrasive.23 Little chastisement has been
spared for some European NATO members that Trump perceives to be avoiding their fair share
of NATO’s collective defence responsibilities.24
18 Richard N. Haass, “The age of nonpolarity: What will follow US dominance,” Foreign Affairs, 87, no. 3 (2008): 50-52.
19 Ibid., 51-52.
20 Wallace J. Thies, Friendly rivals: Bargaining and burden shifting in NATO (Armonk, NY: M.E. Sharpe, 2003): 7.
21 Jo Jakobsen and Tor G. Jakobsen, “Tripwires and free-riders: Do forward-deployed US troops reduce the willingness of host-country citizens
to fight for their country?,” Contemporary Security Policy, 40, no. 2 (2019): 135-164.
22 Harlan Cleveland cited in Tomáš Valášek, “A new transatlantic security bargain,” Carnegie Europe, May 23 2017, accessed September 2
2019, http://carnegieeurope.eu/2017/05/23/new-transatlantic-security-bargain-pub-70050 .
23 Eoin Micheál McNamara, “Between Trump’s America and Putin’s Russia: Nordic-Baltic security relations amid transatlantic drift,” Irish Studies
in International Affairs, 28 (2017): 74-77.
24 Katrin Bennhold, “German Defense spending is falling even shorter. The US isn’t happy,” The New York Times, March 19 2019, accessed
July 1 2019, https://www.nytimes.com/2019/03/19/world/europe/germany-nato-spending-target.html.
25 Andreas Krieg, “Externalizing the burden of war: the Obama Doctrine and US foreign policy in the Middle East,” International Affairs, 92, no.
1 (2016): 97-113.
26 Mikkel Vedby Rasmussen, “‘A parallel globalization of terror’: 9–11, security and globalization,” Cooperation and Conflict, 37, no.3 (2002):
328.
27 Rasmussen, Op. Cit., 328.
63
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
2003, Western policymakers have sometimes got this balance profoundly wrong. Failure here
has contributed to “war fatigue” across Western societies, creating a path-dependency that has
shaped only tentative approaches towards more recent conflicts. Despite this pattern, inaction
is regularly perceived as strategically unaffordable. Therefore, risk-efficient military technologies
have become increasingly crucial for Western security management. These technologies can
reduce the need for ground force deployments, thus easing the risk of military casualties.
Nevertheless, the Western military embrace of advanced technologies such as surveillance
and fighter drones will also inevitably harbour unintended “boomerang effects” that can later
unexpectedly undermine the West’s strategic objectives.
Accelerated by the Revolution in Military Affairs (RMA) that flourished during the 1990s,
precision-strike technology has since transformed NATO’s approach to peace enforcement.
The primacy of NATO airpower was seen in earnest with Operation Allied Force (OAF) against
Serbia’s military actions in Kosovo in 1999. However, it was the NATO-led OUP in Libya
in 2011 that illustrated how ineffective airpower on its own can be when stabilisation is the
ultimate strategic objective. Colin S. Gray argues that it is crucial to see war as “about the peace
it will shape”.28 Beyond the initial phases of an intervention, this is a task that airpower alone
is unable to service. An international peacekeeping presence was not agreed after OUP, Libya’s
fragile state institutions have since failed to prevent a descent into violent deterioration. One
major “boomerang effect” from OUP has been the dense outward refugee flows from war-torn
Libya. The subsequent management of these flows has created some severe political discord
within the EU since 2015.
Drone warfare has emerged as a central feature in the US approach to security management
over the past decade. Barack Obama has frequently been described as America’s “first drone
president”.29 The extensive use of drone strikes to combat suspected terrorist networks and
insurgency strongholds has continued under the Trump administration. President Trump has
approved legislation that reverses previous transparency concerning civilian deaths occurring
from US drone strikes outside Afghanistan and Iraq.30 US drone strategy is consistent with
the deeper “presence of the future” anxieties of the Western risk society. The logic of “targeted
killing” is preventative in its focus; it aims to disrupt or destroy important nodes in terrorist or
insurgent networks before these can coordinate attacks on American citizens or the US military
presence abroad. Risk-aversion has been a primary social condition that has underpinned the
evolution of drone warfare. Attempting to persuade the US population of the ethical virtues
of drone use, Obama has emphasised the headline message that “drone strikes have saved
lives”.31 With the objective to dismantle terrorist networks, drone strikes have been described
as a risk-efficient and “convenient” substitute for ground force deployments.32 According to
Daniel Byman, further advantages include constant disruption of the mobility of terror
group members; a light military footprint that only minimally violates the sovereignty of a
state where a strike takes place; and a decreased dependency on counterterrorism cooperation
28 Colin S. Gray, “How has war changed since the end of the Cold War?,” Parameters, 35, no. 1 (2005): 21.
29 Jared Keller, “America’s long history of hiding airstrikes,” Pacific Standard, October 6 2015, accessed July 1 2019, https://psmag.com/news/
americas-long-history-of-hiding-drone-deaths.
30 “Trump revokes Obama rule on reporting drone strike deaths,” BBC News, March 7 2019, accessed July 1 2019, https://www.bbc.com/
news/world-us-canada-47480207.
31 “Barack Obama: ‘drone strikes have saved lives’,” The Guardian, May 24 2013, accessed July 1 2019, https://www.theguardian.com/world/
video/2013/may/24/barack-obama-drone-strikes-save-lives-video.
32 Daniel L. Byman, “Why drones work: the case for Washington’s weapon of choice,” The Brookings Institution, June 17, 2013, accessed July
1 2019, https://www.brookings.edu/articles/why-drones-work-the-case-for-washingtons-weapon-of-choice/.
64
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
with intelligence services from states with severely poor human rights records such as Pakistan
and Yemen.33
65
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
fighters” into attacking Western societies or to disrupt Western stabilisation efforts within a
particular conflict area as a means of retaliation.41
The possession of sophisticated military technologies can lead to institutionalised over-
exaggerations that misguide force planning. Observing US military engagement in Afghanistan
and Iraq as well as Israel’s war against Hezbollah in south Lebanon in 2006, Herbert R.
McMaster draws the inference that technological superiority did not significantly reduce the
most important uncertainties, or the “fog of war”, typically encountered by state armed forces
fighting in asymmetric conflicts.42 The convenience of superior technology can misguide those
planning these operations into putting “theory before practice”.43 For McMaster, an obsessive
emphasis on technological solutions distracts attention away from military force preparation
geared towards the “human, psychological, political and cultural dimensions of conflict”.44
This remains crucial for the Western military organisations that seek to improve as agents
of stabilisation as their adversaries “use terrain, intermingle with the population, and adopt
countermeasures to technological capabilities” to frustrate their objectives.45
66
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
Spurred on by the RMA’s focus towards Information Technology (IT), complexity in military
technology manufacturing has increased exponentially over recent decades. For Gilli and
Gilli, the more the complexity, the more “incompatibilities and vulnerabilities” are generated
within the production system.51 Through open-source information; conventional intelligence
gathering; and cyber espionage, China’s military-industrial base has been broadly exposed
to Western technological manufacturing practices. The research and development systems
that Beijing possesses for its military’s technology are still yet to cope with the same levels of
complexity as Western equivalents.52 While possessing a military-industrial base advantaged by
deeper historical foundations, Russia’s problems in the same area are more nuanced. President
Vladimir Putin has proclaimed Moscow’s ambition to “lead the world” in the development of
Artificial Intelligence (AI).53 However, as evidenced by the failure of his predecessor Dmitri
Medvedev’s “modernisation from above” initiative for Russia’s civilian economy, a society
that is perpetually riddled with “Endemic corruption, no protections for private property,
and a pervasive state security apparatus” is unlikely to stimulate the innovation required to
achieve Putin’s lofty objective.54 These deeply entrenched structural weaknesses connected
to the respective Chinese and Russian military-industrial complexes should provide US and
EU policymakers with some relief that the dispersal of advanced Western technologies will
not rapidly accelerate and thus majorly assist Russia’s or China’s military prowess over the
immediate term.
Nevertheless, while plausible from the angle of great power competition, this analysis has the
crucial flaw in that it does not account for non-state terrorist and insurgent organisations
and the profound harm that even rudimentary imitation of Western drone technologies can
still cause. Drone technology has been improvised by an anti-government militia in Yemen
to target a ceremonial parade attended by many of that state’s military elite. As it exploded
in the air to rain shrapnel on those below, the drone utilised by rebels resembled a remote-
controlled “dirty bomb”.55 In a brutal conflict where many grievous human rights atrocities
have been committed, Saudi Arabia has militarily intervened to support Yemen’s beleaguered
government. Exchanges between the Saudi military and Yemen’s Houthi militias provide
further lessons on how even rudimentary drone utilisation can strategically advantage guerrilla
forces. Houthi rebels have been able to use drones of modest sophistication to interfere with
the radar systems that guide Saudi Arabia’s US-manufactured Patriot anti-missile batteries. With
these temporarily nullified, Houthi militias have gained the opportunity to shower missiles
onto Saudi Arabia’s neighbouring territories.56 In a globalised world, effective insurgent tactics
assisted by improvised technologies can be quickly replicated elsewhere. The emerging centrality
of different drone technologies in contemporary conflict strategies is a “boomerang effect”
with its source in the modernisation led by Western states. Concerning the US development
of drone technology specifically, Conor Friedersdorf surmised the unintended repercussions
51 Andrea Gilli and Mauro Gilli, “Why China has not caught up yet: Military-technological superiority and the limits of imitation, reverse
engineering, and cyber espionage,” International Security, 43, no. 3 (2018/19):149.
52 Gilli and Gilli, Op. Cit., 187-189.
53 Radina Gigova, “Who Vladimir Putin thinks will rule the world,” CNN, September 2 2017, accessed July 1 2019, https://edition.cnn.
com/2017/09/01/world/putin-artificial-intelligence-will-rule-world/index.html.
54 Aaron Bateman, “Russia’s quest to lead the world in AI is doomed,” Defence One, June 12 2019, accessed July 1 2019, https://www.
defenseone.com/ideas/2019/06/russias-quest-lead-world-ai-doomed/157663/.
55 Conor Friedersdorf, “The unstoppable spread of lethal drones,” The Atlantic, January 31 2019, accessed July 1 2019, https://www.
theatlantic.com/ideas/archive/2019/01/killer-drones/581722/.
56 Friedersdorf, Op. Cit.
67
Beware the Boomerang Effects: Western Risk Society and the
Strategic Backlashes of Military–Technological Modernisation
with the outlook that “The United States [has] hastened the proliferation of a weapon that
diminishes its relative power”.57
68
MULTI-DOMAIN OPERATIONS:
The Need to Develop Resilience and
Capability.
Comdt Gavin Egerton
Deputy Chief Instructor, EUTM, Mali.
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
Abstract
This paper examines the concept of Multi-Domain Operations and its emergence
as the widely accepted template for managing contemporary and future conflict.
The paper adopts the position that Ireland as a country, but the Defence Forces
specifically, would benefit from a more pro-active approach to defence, developing
a comprehensive set of capabilities across increasingly important but less traditional
domains. The author will argue that the Defence Forces should adopt such an
approach not just to develop resilience to a multi-domain attack, but also invest in
acquiring an offensive capability.
The paper will offer historical context to doctrinal change, and how the Defence Forces
could benefit from studying how other countries have adopted change; using the U.S
Army’s implementation of Air Land Battle as an example. The paper will illustrate how
the multi-domain battle plays out, and how other militaries embraced change and
made significant leaps in doctrine and capability.
The paper will outline how a mind-set based on adherence to the ‘Mission Command’
leadership philosophy and the subscription to the ‘Manoeuvrist Approach’ will serve
as a foundation for building a multi-domain capability. The Defence Forces’ adoption
of both these philosophies has conveniently provided it with the doctrinal and cultural
starting point for Multi-Domain Operations. However, successful implementation
of a new concept and subsequent doctrine will be contingent on an open-minded
approach to future force structuring as well as securing necessary capital investment.
Introduction
Traditionally, dominance of the heretofore universally accepted three domains of operation
– air, land, and sea – has provided a conventional military force with a more than favourable
chance of victory over a similar opponent operating in or near those domains. However,
there is an increasing acceptance amongst contemporary militaries and academics that
“historical approaches to achieving superiority in the air, land, and sea domains may no
longer be valid”1. There has emerged, a new contemporary operating environment which
extends into multiple different domains. Some of the factors driving this change include the
affordability and accessibility of high-end technology, particularly in the air, space and cyber
domains, and the advent of information warfare. While on one hand Remotely Piloted
Aircraft System (RPAS) platforms are becoming smaller, cheaper, and more capable; on
the other hand information is becoming increasingly weaponised, and the willingness of
governments to engage in information warfare is growing rapidly.
Although the fundamental nature of war is unlikely to change, the ways and means in
which it is fought are evolving; expanding beyond the theory and practice of combined,
joint operations to include numerous traditional and emerging domains concurrently. This
paper will introduce the reader to the concept of Multi-Domain Operations, and highlight
1 Dr Jeffery M. O’Reilly, “Multi-Domain Operations: A Subtle but Significant Transition in Military Thought”, Air and Space Power Journal,
Spring (2016): 61-73
70
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
the opportunity presented to the Defence Forces to initiate and promote early discussion on
this topic, mitigate its impact, and develop a range of capabilities in this area.
2 “United States Army-Marine Corps White Paper: Multi-Domain Battle: Combined Arms for the 21st Century”, Jan 18 (2017),
3 Gen. David G. Perkins, “Multi-Domain Battle, The Advent of Twenty-First Century War”, Military Review, Nov-Dec (2017): 8-13.
4 U.S. Army Training and Doctrine Command. “Multi-Domain Operations”, Oct 10 (2018). Accessed Jun 24 (2019). url: https://www.tradoc.
army.mil/Publications-and-Resources/Article-Display/Article/1655556/multi-domain-operations/
5 Department of the Army. “FM 3-0: Operations”. Oct 06 (2017): 1-17
71
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
In an attempt to bridge the gap between doctrinal text books and units executing tactical tasks,
the U.S. Army, in the early 1980s, devised a multidimensional warfighting doctrine called ‘Air
Land Battle’. Inspired by the combined arms German ‘Blitzkrieg’ of World War II, it was seen as
a “shift from a focus on low-intensity, small-unit, decentralized counterinsurgency operations to
larger-scale operations, heavily dependent on sophisticated technology for decisive operations
fighting outnumbered”6. This was a conscious migration from the Vietnam era warfare to the
potential European war against the Soviet Union; should the Cold War heat up. Air Land
Battle focused on the successful integration of land forces such as tanks, armoured infantry,
and mobile artillery; with close combat aviation support (i.e. attack helicopters) to destroy
enemy armour, and Air Force support to strike the enemy’s rear areas in order to restrict the
flow of logistics. It was devised in parallel with large scale procurement projects such as the
AH-64 Apache attack helicopter, the M1A1 Abrams main battle tank, the M2 Bradley infantry
fighting vehicle, and the UH-60 Black Hawk utility helicopter; recognising and exploiting new
capabilities and integrating them together for combined arms operations. The Air Land Battle
concept was rehearsed, refined, and repeated throughout the 1980s until it was finally tested
in combat in 1991. This trial by fire was not against the anticipated foe of the Soviet Union,
but rather Saddam Hussein’s vast Iraqi army during Operation Desert Storm in the Persian
Gulf. The joint offensive capability demonstrated during Desert Storm justified the extensive
investment in combined arms and joint training throughout the 1980s and established the
United States of America as the dominant world power; in military terms at least. But this
hegemony was challenged in the first decade of this century, by the shift from conventional
warfighting to asymmetric, terrorist, and hybrid warfare, forcing western militaries to rethink
their doctrine.
Relatively inexpensive improvised explosive devices in Iraq and Afghanistan caused significant
casualties, and continue to do so. During the lifetime of the NATO-led International Security
Assistance Force (ISAF), NATO and coalition forces suffered 1,401 deaths to IEDs, just over
50% of total combat losses7. This is despite the presence of the most advanced combat and
force protection equipment ever produced and employment of a thoroughly rehearsed and
battle-proven combined, joint doctrine.
The United States’ adversaries or potential future adversaries have studied the performance
of the U.S. military during the Gulf War and are “adapting their methods of warfare, while
accelerating the modernization and professionalization of their combat forces”8. Instead
of trying to match or out-gun the U.S. military they strive “to gain strategic advantage by
offsetting the advantages [the U.S. military has] enjoyed over the last twenty years”9. Essentially,
asymmetry in terms of mass or combat power is no longer a decisive factor in battle.
6 Col. Scott King, U.S Army retired; Maj. Dennis B. Boykin IV, U.S. Army retired: “Distinctly Different Doctrine: Why Multi-Domain Operations
Isn’t Air Land Battle 2.0”, Association of the United States Army, Feb 20 (2019). Accessed Jun 25 (2019). https://www.ausa.org/articles/
distinctly-different-doctrine-why-multi-domain-operations-isn%E2%80%99t-airland-battle-20.
7 Areppim. “Afganistan War: Coalition Deaths 2001 – 2014”, Feb 17 (2015). Accessed Jun 28, 2019. url: http://stats.areppim.com/stats/
stats_afghanwar_ied.htm
8 Gen. David G. Perkins, “Multi-Domain Battle, The Advent of Twenty-First Century War”, Military Review, Nov-Dec 17: 8-13.
9 Ibid
72
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
73
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
74
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
attack (and associated potential information warfare attack) it would reap benefits for both
on-island and overseas operations across all three DF components, as well as offering utility
to other State agencies. The potential reputational damage for Ireland as a nation, and the
associated multinational forces the DF deploy with is enormous, should an overseas Irish Army
infantry battalion or Naval Service ship be compromised via a deliberate or opportunistic
cyber-attack. By expanding this to an offensive capability at the tactical level – even just as a
deterrent – the DF could enhance force protection and increase the chances of mission success
if deployed on a robust crisis management operation, or if it found itself engaged in combat.
The threat of electronic warfare should not be overlooked. By ensuring its communications
networks are resilient to interference, the DF could protect its communications networks from
the type of electronic attack employed at Zelenopillya as outlined above, as well as guarding
important communications capabilities vital to the many overseas peace support operations the
DF are currently deployed upon. Finally, RPAS is an area the DF could quickly expand beyond
its current capability, pushing large numbers of (relatively) low-cost aerial surveillance into the
hands of tactical commanders both on-island and overseas, increasing situational awareness,
intelligence collection, and ultimately enhancing force protection.
75
Multi-Domain Operations:
The Need to Develop Resilience and Capability.
Conclusion
Success for the DF in the multi-domain era will be largely contingent on a comprehensive
approach to procurement, preparation, and operation. Using the familiar DOTMLPFI
spectrum – doctrine, organisation, training, materiel, leadership, personnel, facilities, the DF
and Department of Defence will need to be pragmatic in its implementation. This means
developing new doctrine, and adapting existing tactics, techniques and procedures, redesigning
and adopting a force structure that is far more joint, far more multidisciplinary (all arms,
all domains) at the tactical and operational level, and far more flexible. The next generation
of procurement of weapons, equipment, and communications infrastructure will need to be
future-proofed against cyber and electronic attack, resilient to conventional attack, and capable
of operating in the multi-domain environment in all phases of war.
Multi-domain is not new and the close relationship between operations across the air, land,
and maritime domains has been the key to success in many wars throughout the 20th century.
However, dominance of one or more of those domains is no longer a guarantee of victory. The
contemporary operating environment and the likely nature of potential future conflicts require
commanders to consider the close integration of space, information, and electromagnetic
capabilities. The proliferation of low cost technologies such as RPAS, increased access to cyber
capabilities, and the weaponisation of information, means conventional militaries such as the
DF must be one step ahead of potential belligerents and spoilers. For the DF to move forward
into the Multi-Domain Operations environment, the key to success lies in the convergence of
services into a truly joint force, rather than the co-operation and integration of independent
service capabilities as is currently the case. This will take an open-minded approach by both
the DF and the Department of Defence, particularly where future force design and capital
investment are concerned. Perhaps inspiration can be drawn from this excerpt from the first
doctrinal manual published by the DF in the era of the newly emerging independent Ireland
in 1926:
“Our forces are not equipped as liberally as those of large armies, but a sound understanding of all
modern means of combat, including those which we do not possess (Aviation, numerous and heavy
Artillery, Tanks, etc.) will enable us to find the ways and means to sustain a struggle against an
enemy equipped with them.”23
23 “Defence Forces Regulations, Tactical Drill”, 1926, as quoted by Colonel (retd) Tom Hodson, “The College: The Irish Military College, 1930-
2000”, Dublin, The History Press, 2016.
76
‘FIRST WITH THE TRUTH’
The Paradox of Future
Information-led Conflict
Dr. David Reindorp
Execuitve Director, Opportuna: Insight Consulting.
‘First with the Truth’
The Paradox of Future Information-led Conflict
Abstract
‘It is precisely facts that do not exist, only interpretations’1
In 2015, the Irish Government published a Defence White Paper which, among other points,
emphasised the Irish Defence Forces (DF) ‘continual (and continuing) involvement in UN
peacekeeping operations’.2 In 2018, a seminar directed by the author challenged conventional
wisdom regarding the practice of Command and Control (C2). The primary witnesses were
the UK commander of perhaps the final pre-information age conflict, and a recently retired
UK Chief of Joint Operations. They concluded that C2 as currently practiced is not fit for
purpose, and observed that while the UK had closed the gap between today’s capabilities and
tomorrow’s wars, it had not made similar progress with regard to concepts. Many of which
remain unchanged at a time when the operating environment to which they relate is becoming
more complex. The seminar audience acknowledged that closing this intellectual gap will be
difficult. They were, however, convinced of the need to do so, to avoid the future practice of
C2 being constrained by yesterday’s ideas.
Introduction
The UK Defence Doctrine and Concepts Centre’s (DCDC) Joint Concept Note (JCN) 1/17
offers a Joint Action model where all military activity comes together into a single output
labelled ‘influence’.3 The prime enabler of which is to be a technology-enabled capability to
analyse and use information to make better decisions at the operational and strategic level.4
This is further developed by JCN 2/18, which introduces the concept of Information Advantage
and the idea that ‘information … is (now) a fully-fledged national instrument of power’.5 On
the surface these publications offer a compelling thesis, but deeper within questions begin to
emerge. For instance, can something intangible and the sum of everything (i.e. influence) also
be a unique source of power, which can generate advantage over an adversary? There is also an
element of assumed novelty to this thinking along with an assumption that information alone
can deliver conflict-winning benefit. However, the use of information for military purposes
is not new,6 and there is little doctrine associated with the practice of using information as a
source of power.7
Meanwhile, and building on this idea of ‘influence’, a recent multi-national command post
exercise sought to develop narrative-led campaign plans, each attempting to synchronise
information with other activity in an effort to be ‘first with the truth’, thus implying there
is a single truth to tell.8 However, given the increasingly relative nature of political (and thus
military) truth, and the declining levels of trust in governments and their institutions, is this a
viable objective?
1 Friedrich Nietzsche, The Will to Power, trans. Walter Kaufmann and R. J. Hollingdale (New York: Random House, 1967), 481.
2 Irish Government Ministry of Defence, ‘White Paper on Defence’ (Dublin, 2015) 32. Available at https://military.ie/en/public-information/
publications/.
3 Defined as ‘the capacity to have an effect on the character, or behaviour of someone or something’.
4 The author and Vedette Consulting are supporting the UK’s Defence Science and Technology Laboratory (Dstl) Operational Decision Support
Tools (OpDST) and Innovative Models, Methods and Techniques (IMMT) projects. Both seek to engage with industry to develop decision-
enhancing technology such as military chatbots and Course of Action testing models for use in component-level HQs.
5 UK Government Ministry of Defence, Information Advantage, Joint Concept Note 1/18 (Swindon: Development, Concepts and Doctrine
Centre, 2018), iii.
6 The necessity to know you enemy is enshrined in literature while the use of deception and thus (mis)information is at the heart of the campaign
planning process. Sun Tzu and Clausewitz both support this view. The latter suggesting knowledge in warfare to be ‘a factor more vital than any
other’.
7 Although there is doctrine for public relations, media operations and strategic communications, none addresses how a measurable military
effect can be achieved by or through influence and information alone.
8 Observed by the author during a conversation between a 2* UK Commander and his Strategic Communications Advisor on Exercise Joint
Venture 2018.
78
‘First with the Truth’
The Paradox of Future Information-led Conflict
This paper will explore the questions outlined above while avoiding a metaphysical discourse
on the nature of truth. From a premise that the truth – in political terms at least – is invariably
contested, it will posit that there is an emerging paradox at the centre of this information-led
renaissance which will challenge current approaches to strategy, planning, and thus the practice
of Command and Control (C2) and military decision making.
9 Kate Utting, “Strategy, Influence, Strategic Communication and British Military Doctrine” in Propaganda, Power and Persuasion, edited by
David Welch (London: IB Tauris & Co: 2014) 167. Utting is referring here to JCN 1/17. This use of the word ‘smart’ in this context should not be
conflated with Nye’s later development of ‘smart power’ as a combination of both hard and soft manifestations.
10 Ibid.
11 Joseph Nye, “The Information Revolution and Soft Power”, Current History, 2014 - 113(759): 19-22. Arquilla’s actual suggestion being ‘… in
today’s global information age, victory may sometimes depend not on whose army wins, but on whose story wins’.
12Ibid.
13 Many others contributed to the development of this concept. For a good review see John Arquilla and David Ronfeldt, ed; In Athena’s Camp
(Santa Monica: Rand 1997).
14 Christine Lagarde, ‘There’s a reason for the lack of trust in government and business: corruption’, The Guardian, May 04, 2018.
15 Maxine-Laurie Marshall, ‘The rise of distributed trust’, Oct 2018, https://www.i-cio.com/big-thinkers/rachel-botsman/item/the-rise-of-
distributed-trust.
16 See Rachel Botsman, Who Can You Trust – How Technology Brought Us Together and Why It could Drive Us Apart (London: Penguin
2018).
79
‘First with the Truth’
The Paradox of Future Information-led Conflict
as controlled, and to an extent assured, by algorithms that learn what users are interested in. It
is this developed-as-understood process that generates the echo chamber effect of digital media
and its ability to turn a relatively innocuous story into a ‘shitstorm’.17 The cumulative outcome
of which is an increasing mistrust of the single truth of an institution, and a corresponding
increase in belief of the views of individual commentators or communities. As Botsam suggests,
‘… the idea is that trust, and alongside it power … can now flow directly between individuals
without the need for traditional institutions’.18 And here lies the first element of the paradox
of information-led conflict, in that the technologies used to harness the power of information,
and underpin the concept of influence, are also enabling the rise of distributed trust. Making
those who seek to be ‘first with the truth’ less likely to be trusted.
17 ‘Shitstorm’ - a term of art applied to social media’s ability to spread information rapidly to unlimited amounts of users, turning relatively
innocuous memes into a crisis and thence an online attack against a particular person, brand, idea etc as the counter-message ‘goes viral’. Its
origin is unknown but the term can be found in numerous online dictionaries and also in Durden, the German equivalent of the Oxford English
Dictionary. See https://www.theguardian.com/books/booksblog/2013/jul/04/shitstorm-german-dictionary-duden-shitschturm.
18 Marshall, Op. Cit.
19 For instance see Michel Foucault, Power/Knowledge: Selected -Interviews and Other Writings 1972-1977, (ed. By C Gordon) (New York:
Pantheon) 121 – 190. Here Foucault suggests his rethinking of how information operates as power will allow it to ‘cut off the King’s Head’ (i.e.
state power) and ‘bring into being new schemas of politicisation’ that can be exercised by bodies other than the state.
20 See Paul Rabinow, ed, The Foucault Reader: An Introduction to Foucault’s thought (London: Penguin, 1991).
21 For instance, the rise of the ‘false news’ debate and agenda.
80
‘First with the Truth’
The Paradox of Future Information-led Conflict
‘comes from everywhere’.22 Unlike the more traditional concepts of diplomatic, economic and
military power, that are confined by policy, law and thus practice to the institutional few,
informational power can be gained and exploited for overt political benefit by anyone with the
ability to disseminate it. It gains in strength through dispersal, not concentration, and where
power is not, or cannot be centralised or contained, it tends to the opposite of what power has
traditionally been used for.
This then is the second element of the paradox of information-led conflict. In that its primary
enabler – the dissemination of information – dilutes the very power it seeks to create. It
reverses the adage that knowledge is power, and thus access to it should be restricted to the few,
by providing power to the many. Moreover, where no one group has a monopoly on power,
legitimate or otherwise, chaos tends to follow. Chaos, of course, being the antithesis of control
and not a normal objective of any planning and decision making process.
81
‘First with the Truth’
The Paradox of Future Information-led Conflict
is the standard Plan, Refine, Execute, Assess (PREA) cycle adopted by NATO, UK and US
operational HQs. The governance of which is metric based and thus by definition, tangible.
Yet information-led conflict need not follow any of these rules. For example, the power of
information rests in its diffusion or spread, thus it is not confinable by geography. Unlike
conventional military power (air, land, maritime etc.) which can be developed before being
used, informational power is developed while being used. It cannot, therefore, be confined
within arbitrary and usually short, contingent timeframes. As Rothrock wrote in 1994, the
information-led battle ‘will not happen quickly … it will probably be years to decades … (and for)
employment in long-term campaigns such as the ‘war of ideas’’.26 How, therefore, are decisive conditions
and supporting effects to be measured and assessed? If power is now intangible, how are centres
of gravity derived? In addition, if progress is now indeterminable, how is culmination assessed
and a rational calculus differentiated? In sum, how does a commander design a viable theory of
military information and/or influence-led change, and then command and control its delivery?
Here, then, is the third and final element of the paradox of information-led conflict.
Informational power may generate advantage, and thus Influence may be the most apposite
high-level conceptualisation of military output. However, both will challenge the current
principles of strategy development and operational-level C2. Moreover, until addressed, they
will leave military decision makers playing a new game with old rules or fighting tomorrow’s
battles with yesterday’s concepts.
Conclusion
This paper suggests there is a widening gap between the concepts used to think about warfare
today and the capability to actually practice it tomorrow. It further posits that this gap
particularly effects C2 and military decision making. As evidence, it identifies an emerging
paradox at the centre of the current focus on the ability of information and Influence to
generate advantage and win.
This paradox has three components. First that the technologies used to become ‘first with the
truth’ also enable the ‘distributed trust’ which makes it less likely to be believed. Second, and
similarly, that by disseminating information the power of it declines, and with it the ability to
gain the control being sought. Indeed, and as the Fallujah example suggests, informational
power tends as much to chaos (in the form of counter-narratives) as control. Third, and
somewhat more prosaically, regarding information as power challenges the current building
blocks of operational planning and strategy. End states are diffuse, timescales potentially
endless and geographical boundaries no longer relevant. Consequently, previously tangible
planning tools such as centres of gravity, decisive conditions and supporting effects become
increasingly difficult to define, if not potentially obsolete.
Nevertheless, the military utility of information is clearly undergoing a renaissance. However,
whether it can be usefully conceptualised as a unique source of power has yet to be established.
Arguably, information in the form of a coherent narrative has the power to deny, at least
in political terms, the otherwise battle-winning capability of a more advanced adversary.
26 John Rothrock, “Information Warfare: Time for Some Constructive Scepticism”, ed John Arquilla and David Ronsfeldt (Santa Monica: Rand
1997) 219.
82
‘First with the Truth’
The Paradox of Future Information-led Conflict
This, though, is not quite the same as being able to win or deliver victory. What this will mean
for traditional warfighting practices such as operational-level planning, campaign assessment
and C2 has yet to fully emerge. Nevertheless, that it will change them is beyond doubt. In the
interim, today’s commanders, despite being invited to do so, will find it challenging to be ‘first
with the truth’. They may be first with their truth, but in the information age, this will not
be enough.
So, to return to the beginning, the 2015 (Irish) Defence White Paper and the IDF’s history
of involvement in peacekeeping operations. The former offers a list of the tasks most closely
associated with this honourable tradition, including: ‘peace enforcement, peacekeeping,
disarmament, truce supervision, and/or observation, military training and education,
international humanitarian law and human rights law missions’.27 All of which involve the
maintenance of control by a trusted agent of the UN or some other similar institution.
Predominantly via the use of normative influence or messaging activity. However, as this paper
suggests, such trust is declining, and with it, the value of the ‘story’ – not the army – that
will deliver an information age ‘win’. It is arguable; therefore, that the paradoxical nature of
information-led conflict will pose a proportionately greater challenge to those – such as the
IDF - whose mission is to interpose, than those – such as the UK armed forces - who mission
is to defeat.
83
84
TELE-MENTAL HEALTH AND
PSYCHOSOCIAL SUPPORT:
A Case for Implementation with Irish
Defence Forces Personnel.
Pte (AR) Eoin O'Shea
7 Inf Battalion
Abstract
This article investigates the utility and efficacy of Tele-Mental Health (TMH) in the
context of enhancing military mental health services and operational psychosocial
support structures. This involves a review of research concerning the effectiveness of
TMH in military populations. Papers reviewed included those published since 2010
that report empirically observed benefits on numerous outcomes, which relate to
mental health and wellbeing; whilst also focusing on those that include technologies
and processes of viable application in moderately sized military organisations such
as Ireland’s Defence Forces (DF). Results are presented in terms of modality or
format (e.g. audio-visual platform, email, online support groups) and demonstrated
effectiveness for service recipients. The article considers a potential service provision
model deliverable through both the DF’s Medical Corps as well as its Personnel
Support Service (PSS). Distinctions between both the DF Medical Corps mental
health capability and the wellbeing support provided by the PSS in this regard are
explored, recognising the differences in remit between both entities.
Introduction
TMH has received considerable interest and support through international research. TMH
broadly refers to any form of mental health and wellbeing support provided over distance
through technological means; common examples include audio-visual interfaces (e.g. Skype,
Defence Forces Intranet) for assessment and treatment consultations, online support groups,
psychoeducational informational resources, and email support.1 More specifically, the
application of TMH in assisting military personnel and their families has been demonstrated
to represent an effective and viable option in mental health and wellbeing service provision.23
TMH may address barriers to effective care for these populations related to accessibility,
cost-effectiveness, and provision of more specialist medical corps interventions (e.g. clinical
psychologist, psychiatrist) for those serving on operational deployments overseas or at home.
86
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
87
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
combat. Importantly, the same authors noted that: “Perceived meaningfulness of the mission,
post-deployment social supports, and positive perception of homecoming were associated with
lower likelihood of distress (p.464)” and may therefore be regarded as protective factors.
In the Irish military context, the relevance of a timely and effectively supportive response from
the DF’s Medical Corps and PSS are of clear and likely value in relation to such findings.
In a more recent example of mental health morbidity among Australian peace-keepers17,
12-month prevalence of numerous mental disorders among personnel were of particular note,
namely: PTSD (16.8%), depression (7%), generalised anxiety disorder (4.7%), alcohol misuse
(12%), alcohol dependence (11.3%) and suicidal ideation (10.7%). Such findings reflect a
higher prevalence than that found among civilians and the presence of these mental health
conditions was most strongly and consistently associated with exposure to potentially traumatic
experiences (PTEs). These issues are primarily addressed in the Irish DF via the operational
resources delivered by the Medical Corps and the Personnel Support Service (PSS).
88
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
formats, personnel accessing these services can avail of signposting and referral to resources
of relevance concerning matters such as bereavement, substance misuse, family issues, and
relationships. A strong focus of the service is the support of families both during deployments
and beyond. The PSS also has links with, and provides supports for, veterans.
Tele-Mental Health
A significant body of research now exists concerning the use of distance technologies for various
forms of mental health and wellbeing-related information, assessment, and intervention. For
example, in a large-scale review21 of TMH trials, the authors conclude that research conducted
up until 2003 suggests strong evidence for patient and provider satisfaction with a range of
TMH services as well as evidence for the reliability of clinical assessments relative to face-to-
face versions. They also noted more minimal evidence supporting its use in treating specific
mental health disorders, limited additional benefits for specific populations, or comparable
effectiveness for populations such as older adults, children, or those living in rural areas with
lesser healthcare access. Encouragingly, research undertaken since then has utilised both better
technology, as well as more sophisticated research designs, most notably a growing number of
Randomised Controlled Trials (RCTs). According to one of the most recent RCTs conducted
to date, “tele-mental health has demonstrated equivalent efficacy compared to face-to-face care
in a variety of clinical settings and with specific patient populations”. An updated review22 is
similarly positive, suggesting:
Telemental health is effective for diagnosis and assessment across many populations … and for
disorders in many settings (e.g. emergency, home health) and appears to be comparable to in-person
care. In addition, this review has identified new models of care (i.e., collaborative care, asynchronous,
mobile) with equally positive outcomes… Telemental health is effective and increases access to care.
Much of the reviewed research outlined above pertains to video-conferencing interaction, a
format thought to maximise the amount of multi-sensory information otherwise lost to both
clinician and patient during interaction. However, a large meta-analytic study23 examined a
comprehensive variety of different types of online formats (e.g. email, video-conferencing,
psychoeducational materials, etc). The authors similarly conclude that: “A comparison
between face-to-face and Internet intervention … revealed no differences in effectiveness. The
findings of this meta-analysis… provide strong support for the adoption of online psychological
interventions as a legitimate therapeutic activity” (p.109). Furthermore, a distinction seems to
occur between a client’s initial perception of, and confidence in, the acceptability of online
versus in-person interaction once the client has actually experienced online service provision.24
Findings concerning patient satisfaction, as well as therapeutic alliance, compare equivalently
between both modalities.25
21 Richardson, Lisa K., B. Christopher Frueh, Anouk L. Grubaugh, Leonard Egede, and Jon D. Elhai. “Current directions in videoconferencing
telemental health research.” Clinical Psychology: Science and Practice 16, no. 3 (2009): 323-338.
22 Hilty, Donald M., Daphne C. Ferrer, Michelle Burke Parish, Barb Johnston, Edward J. Callahan, and Peter M. Yellowlees. “The effectiveness of
telemental health: a 2013 review.” Telemedicine and e-Health 19, no. 6 (2013): 444.
23 Barak et al., Op Cit 109.
24 Gros, Daniel F, Cynthia Luethcke Lancaster, Cristina M López, and Ron Acierno. “Treatment Satisfaction of Home-Based Telehealth versus
in-Person Delivery of Prolonged Exposure for Combat-Related PTSD in Veterans.” Journal of Telemedicine and Telecare 24, no. 1 (January
2018): 51-55.
25 Jenkins-Guarnieri, Michael A., Larry D. Pruitt, David D. Luxton, and Kristine Johnson. “Patient perceptions of telemental health: Systematic
review of direct comparisons to in-person psychotherapeutic treatments.” Telemedicine and e-Health 21, no. 8 (2015): 652-660.
89
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
26 Pelton, Dan, Bethany Wangelin, and Peter Tuerk. “Utilizing telehealth to support treatment of acute stress disorder in a theater of war:
Prolonged exposure via clinical videoconferencing.” Telemedicine and e-Health 21, no. 5 (2015): 382-387.
27 Gros, Daniel F., Matthew Yoder, Peter W. Tuerk, Brian E. Lozano, and Ron Acierno. “Exposure therapy for PTSD delivered to veterans via
telehealth: Predictors of treatment completion and outcome and comparison to treatment delivered in person.” Behavior Therapy 42, no. 2
(2011): 276-283.
28 Turgoose, David, Rachel Ashwick, and Dominic Murphy. “Systematic review of lessons learned from delivering tele-therapy to veterans with
post-traumatic stress disorder.” Journal of telemedicine and telecare 24, no. 9 (2018): 575-585.
29 Resick, Patricia A., Jennifer Schuster Wachen, Katherine A. Dondanville, Kristi E. Pruiksma, Jeffrey S. Yarvis, Alan L. Peterson, Jim Mintz
et al. “Effect of group vs individual cognitive processing therapy in active-duty military seeking treatment for posttraumatic stress disorder: A
randomized clinical trial.” JAMA psychiatry 74, no. 1 (2017): 28-36.
30 Gros et al., Op Cit, 53.
31 Luxton et al., Op Cit, 923.
32 Neighbors, Clayton, Melissa A. Lewis, David C. Atkins, Megan M. Jensen, Theresa Walter, Nicole Fossos, Christine M. Lee, and Mary E.
Larimer. “Efficacy of web-based personalized normative feedback: a two-year randomized controlled trial.” Journal of consulting and clinical
psychology 78, no. 6 (2010): 898.
33 Resick, Patricia A., Jennifer Schuster Wachen, Jim Mintz, Stacey Young-McCaughan, John D. Roache, Adam M. Borah, Elisa V. Borah et al.
“A randomized clinical trial of group cognitive processing therapy compared with group present-centered therapy for PTSD among active duty
military personnel.” Journal of Consulting and Clinical Psychology 83, no. 6 (2015): 1058-1068.
34 Steenkamp, Maria M., Brett T. Litz, Charles W. Hoge, and Charles R. Marmar. “Psychotherapy for military-related PTSD: a review of
randomized clinical trials.” Jama 314, no. 5 (2015): 489-500.
35 Pelton et al., Op Cit, 384.
36 Hall-Clark, Brittany N., Edward C. Wright, Brooke A. Fina, Tabatha H. Blount, Wyatt R. Evans, Patricia K. Carreño, Alan L. Peterson, Edna
B. Foa, and STRONG STAR Consortium. “Military culture considerations in Prolonged Exposure Therapy with active-duty military service
members.” Cognitive and Behavioral Practice 26, no. 2 (2019): 335-350.
37 Smolenski, Derek J., Larry D. Pruitt, Simona Vuletic, David D. Luxton, and Gregory Gahm. “Unobserved heterogeneity in response to treatment
for depression through videoconference.” Psychiatric rehabilitation journal 40, no. 3 (2017): 303.
38 Rosen, Craig S., Kathleen M. Chard, Patricia Resick, and B. Christopher Frueh. “Cognitive processing therapy for posttraumatic stress
disorder delivered to rural veterans via telemental health: a randomized noninferiority clinical trial.” J Clin Psychiatry 75, no. 5 (2014): 470-476.
39 Price, Laura E., Paraskevi Noulas, Irina Wen, and Amanda Spray. “A portal to healing: Treating military families and veterans through
telehealth.” Journal of clinical psychology 75, no. 2 (2019): 271-281.
40 Grady, Brian J., and Ted Melcer. “A retrospective evaluation of TeleMental Healthcare services for remote military populations.” Telemedicine
Journal & E-Health 11, no. 5 (2005): 551-558.
90
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
Future Developments
More research is required on the utility and efficacy of TMH for military personnel. Additional
investigations are also necessary, prior to any implementation of TMH within the Irish DF.
However, research reviewed in this paper suggests the potential utility of TMH and wellbeing
supports through both the Medical Corps as well as PSS. Examples are provided hereafter and
might fall under three broad categories, namely: (1) Broad informational and psychoeducational
support; (2) ‘In-theatre’ specialist assessment and intervention; and (3) ‘Home-based’ treatment
and care. Specific research examples concerning a range of potential applications are thereafter
provided in Appendix A. These include studies of TMH applied to the treatment of PTSD43
and other traumatic disorders44, more common mental health difficulties45, mental health
screening46, psychoeducation47, and the support of military families48.
Firstly, it seems entirely feasible to use distance-technologies to provide effective informational
support49 to a broad range of individuals in the context of the DF. In addition to information
already provided by the PSS in this regard, further options could include more comprehensive
psychoeducational and wellbeing-related information; these might be developed not only
for currently serving personnel, but also families and veterans, as per the stated remit of
the PSS. Brief online questionnaires, completely anonymised to ensure confidentiality and
GDPR adherence, could be utilised in actively bringing to the attention of personnel a variety
of services (both internal and external) of potential relevance, based on answers to specific
questionnaire items. The same process could be used to export, possibly in the form of a
‘personalised’ report, psychoeducational, and other health-related materials concerning a
broad range of subjects including stress management, diet, physical fitness, and relational/
family support whilst serving overseas.
Secondly, existing Medical Corps mental health expertise could be utilised more promptly
when required for personnel serving overseas. Psychological assessment, medication review,
second opinion evaluations, direct therapeutic intervention, as well as consultation with an
individual or unit’s Chain of Command whilst overseas could be expedited through the use
91
Tele-mental health and psychosocial support:
A case for implementation with Irish Defence Forces personnel.
of audio-visual technologies. In some research,50 even conditions such as Acute Stress Disorder
have successfully been treated in-theatre, and remotely. Similarly, this could facilitate mental
health specialists to make decisions about the necessity of an individual returning to Ireland
due to mental health concerns. Such a capability could help forego costly, disruptive, and
potentially unnecessary removal of personnel from operational duties.
Finally, both the Medical Corps and PSS could provide their respective supports to personnel
remotely in Ireland. In support terms, there is a Barrack Personnel Support Service Officer
and 16 chaplains available to personnel across every DF barracks. However, resources involving
in-person provision of clinical psychological assessment and evidence-supported treatment by
the Medical Corps, as well as personal counselling and pastoral support (PSS), are limited to
only a few locations across the country. Therefore, the increased use, and evaluation of, TMH
through both the Medical Corps and PSS seems worthy of further investigation. Through
judicious ethical and professional considerations51 52, coupled with a minimal investment in
the technological and practical resources required, numerous mental wellbeing supports could
be offered to personnel based at smaller military installations; or even in their own homes
under certain circumstances. Finally, the PSS support provided to families of currently serving
personnel, as well as veterans, could likely be enhanced through such means.
Conclusion
This paper has sought to review evidence concerning relevant studies of military mental health,
the effectiveness of TMH generally, and its use with military populations to date. The authors
have concluded with a brief description of a variety of ways in which TMH might benefit the
mental health and wellbeing of DF personnel, citing specific examples of research supporting
same. Though the current paper addresses such possibilities largely in relation to currently
serving personnel, similar applications may prove just as feasible for both families and our
country’s veterans. Based on such evidence, it is proposed that TMH supports be further
researched for future use by the DF, with due regard afforded to important issues concerning
safe implementation, technological requirements and the feasibility, confidentiality, and user
experience of the technologies involved.
92
JOINT FORCE COMMAND:
The Need for Change
Lt Cdr Paul Hegarty
Instructor, Command & Staff School
Joint Force Command: The Need for Change
Abstract
This paper examines the current structure of the Irish Defence Forces and seeks
to establish if its structure remains suitable in today’s operating environment. The
paper uses a combination of previous international experience and associated
transformations as a means of exploring if the application of a joint force command
structure would benefit the Irish Defence Forces. By presenting both historic and
current experiences through the use of literature and previous research, the paper
seeks to evaluate the benefits associated with moving away from a single Service
orientated construct and adopting a joint force command structure. In this regard, it
must be remembered that unlike other international militaries, the Defence Forces has
not evolved from its historic land-centric structure.
The paper additionally explains the need for a future joint force concept that looks out
to 2035-2040 and examines its relevance for the Defence Forces. An objective of this
concept is the idea that joint action, and therefore influence can be enhanced through
exploiting information, being more integrated as a force and being more adaptable.
The joint approach is in operation elsewhere and the consensus there is that this
approach is both inevitable and necessary. In no case where it has been applied,
particularly in the last 10 years, have there been moves to reverse course. The paper
concludes by presenting the argument for the necessary paradigm shift towards a
Defence Forces joint force command structure.
Introduction
“Separate ground, sea and air warfare is gone forever. If we ever again should be involved in war,
we will fight with all elements, with all Services, as one single concentrated effort”.1
1 General Dwight D Eisenhower, ‘memorandum to Admiral Chester W Nimitz’, 17 April 1946. Quoted in Griffin, Stuart. Joint Operations: a
short History, Produced by Training Specialist Services, HQ, p.7.
2 Sullivan, Brian R. “The future nature of conflict: A critique of “the American revolution in military affairs” in the era of jointery.” Defense
Analysis 14, no. 2 (1998): 91-100.
3 Military and civilian organisations working together as on unified organisation.
94
Joint Force Command: The Need for Change
Land
Cyber Maritime
Influence
Air Space
Implicit within this acknowledgement is the necessity for commanders and their staffs to
conceive and prepare operations with regard to the “strengths, weaknesses, capabilities and
limitations of all Services” involved, and this is primarily the essence of joint operations.5
Moreover, contemporary military operations are conducted in an expeditionary context due
to the strategic requirement to ‘project power’, therefore, jointery becomes more of a necessity
in order to achieve this objective.6 It is therefore, inferred that a military organisation must
be structured to reflect the way in which it fights and this requires a joint approach, both
structurally and culturally.
In 2015, the Irish Department of Defence published its second White Paper on Defence,
(WP2015), and sought to encapsulate a modernisation programme that would ensure the
DF was capable of providing “an organisation that would be prepared to deliver a flexible
and adaptive response to any adverse changes in a dynamic security environment”.7 Within
WP2015, there was an acknowledgement that the DF would need to be capable of working
jointly in order to achieve this government policy objective8, however, the ability to operate
jointly has historically never been pursued by the DF.
Internationally, jointery is considered a routine modus operandi and is progressively replacing
single service methodologies towards joint military operations. It can, therefore, be proposed
that jointery has become “as much a state of mind as a method of prosecuting war”.9 Modern
operations will be complex and unconventional, and flexibility will be key to coming to terms
with this vague future and joint capabilities are universally accepted as being central to this.10
4 Development, Concepts and Doctrine Centre. JCN 1/17 – Future Force Concept. Shrivenham: Forms and Publications Centre, 2017, 19.
5 B.A. Wood, “Joint Operations: An Essential Aspect of Today’s Armed Forces.” Australian Defence Journal (1999): 19-24.
6 Andrew Dorman, Dr Mike Smith and Dr Matthew Uttley, “Jointery and Combined Operations in an Expeditionary Era: Defining the Issues”,
Defence Analysis, 14, no. 1 (1998): 5. Doi: 1080/07430179808405745.
7 Department of Defence, White Paper on Defence 2015 (Dublin, 2015) 5.
8 Ibid., 62.
9 Griffin, Joint operations, 7.
10 Ibid., 23.
95
Joint Force Command: The Need for Change
96
Joint Force Command: The Need for Change
which places too much emphasis on military strength, geared for a specific geography, be
it land, sea or air, can prove woefully vulnerable if strategic history takes an unanticipated
course.21 To prepare for the operations of the future there is a need to modernise and transform
towards the long-term future and not just the near-term. Military forces continuously deal
with uncertainty and this permeates the current security environment and the ‘fog of war’
will inevitably transcend our view of how the operational environment will evolve both in the
medium to long- term.22
In an attempt to provide context to the application of Joint Forces Command (JFC), the
following section will introduce two international experiences of transformation towards a
JFC and presents a synopsis of research already conducted by the author.23 The first review
will be that of the Royal New Zealand Defence Forces (NZDF) and the second will be of the
Royal Canadian Armed Forces (CAF). The NZDF was selected as it is comparable in size to the
DF, shares a similar mind-set and has a similar operating profile. The Canadian experience of
JFC is perceived internationally as an example of how not to implement a joint approach and
remains viewed as a “bold move, one that none of Canada’s allies has yet replicated.”24
97
Joint Force Command: The Need for Change
the NZDF and the NZ Ministry of Defence.”29 A variety of measures were introduced to give
effect to this, including a public statement of intent by the NZ Government that set out a
joint approach as the new standard to be used in the NZDF.30
The primary command and
control and structural arrangements as outlined in the Hunn Report were adopted and
the Commander of Joint Forces New Zealand (COMJFNZ) leads JFC and this includes
all “deployable NZDF Force Elements.”31 In addition COMJFNZ is responsible for the
command and control of all joint and/or combined (international) operations and exercises.
This includes the requirement of the three single Service chiefs to maintain the capability of
“raising, training and maintaining their own Services and bringing assigned forces to their
Directed Level of Capability (DLOC).”32
In order to ensure that the Single Services were capable of operating and delivering at the
joint operational level, internal changes were also initiated in many of the various command
and control and training functions. These changes included: “the Joint Forces Headquarters;
a joint staff college; a joint appointment process for senior staff requiring clearances by
all three Service chiefs; information technology centralisation and standardisation; and
development of a joint non-operational logistic and support organisation.”33
Furthermore, to achieve greater jointness and cooperation at the civilian-military level, a
new approach to allocating responsibility and accountability was implemented. The result
of these measures ensured that greater clarity was provided as to who was responsible for
advising Government on military matters, thus serving to underpin the Government’s
defence outcomes. Finally, all command and control accountability was assigned to the
Chief of Defence Staff (CDS)34 and the Secretary of Defence on a similar but shared basis.35
The NZDF White Paper on Defence 2016 elaborated on the successes the previous reforms
have obtained and highlighted additional areas of organisational change that will occur as
the NZDF progresses towards an Integrated Defence Force by 2035.36 A revised corporate
structure now exists and additional joint functions have been added: Chief of Defence
Strategy and Governance, Chief Joint Defence Services and Chief People Officer, to ensure
that a more holistic view is being taken towards defence, as demonstrated in Figure 2.
98
Joint Force Command: The Need for Change
The following section will review the transition of the Royal Canadian Armed Forces (CAF).
The Canadian Armed Forces (CAF) initiated a unification process under the Canadian White
Paper on Defence in 1964 and sought to unify all three single Services under one single
Defence Force.37 The primary function of the strategy witnessed the loss in the legal status
of the single Services and legitimised the new organisation, which was termed the ‘Canadian
Forces (CF)’. The core objectives for pursuing this amalgamation was to create a force that was
more efficient and effective, to reduce operating costs and to create a common identity and
encourage a higher level of loyalty than that which is given to a single Service.38 By creating
a new organisational culture it was envisaged that the new force would rescind any previous
loyalty to the previous regimental system and that the induction of a new singular uniform,
“free of any historical distinguishing markings” would encourage acceptance of the new
single Service.39
Due to the significant change inflicted on the organisation there was a significant level
of opposition against the reorganisation and a high level of high-ranking officers and
personnel resigned from the CF and significant amounts of experience and knowledge were
lost. Frustration was directed at the perceived “cost saving initiative”, many considered the
reorganisation to be regressive and it took decades for the Canadian Forces to fully realise
and attempt to repair the damage that had been inflicted.40 To make matters worse, defence
policy in Canada over those years seldom originated from a strategic idea, “a notion Hellyer
had attempted to introduce in 1964, but, rather, it evolved from the dynamics of the annual
federal budget.”41 Without a national defence strategy or a coherent unified defence policy, the
maintenance of defence revolved around the maintenance of a balanced force, however this
focussed on maintaining certain minimal operational capabilities within each Service, a system
that sustained the Service orientated approach to defence planning and force development.42
The arrival of General Rick Hillier as CDS in 2005 provided a much-needed catalyst:
37 Paul Hellyer and Lucien Cardin. “White Paper on Defence.” (Canadian Government paper on the restructuring of Defence, (March 1964),
158.
38 Paul Hellyer and Lucien Cardin. “White Paper on Defence.”, 164.
39 Ibid., 160
40 Ibid., 160.
41 Bland, Douglas. “Chiefs of defence: Government and the united command of the Canadian armed forces.” Canadian Defence Quarterly 25,
no. 3 (1996): 158.
42 Ibid., 268-72.
99
Joint Force Command: The Need for Change
“Canadian Forces identity – Our first loyalty is to Canada. Beyond this fundamental imperative,
all Service personnel must look past environment, component or unit affiliations to most closely
identify with the Canadian Forces. The greater good of Canada and the Canadian Forces will,
in every instance, take precedence over considerations of Service, component or unit affiliation.”43
In order to regain the initiative, organisational changes were required within the CF and these
focussed on three key areas; the CDS assumed control of the force development by establishing
a Chief of Force Development to focus on the now CAF transformation; creation of a Military
Personnel Command, responsible to the CDS; and, the dismantling of the Deputy Chief of
Defence Staff (DCDS) group and the establishment of a strong unified Strategic Joint Staff
(SJS) which reported to the CDS.44 The impact of the Strategic Joint Staff (SJS) was positive and
improved the organisation’s ability to make decisions at the operational level, thus improving
military influence.
In 2009, there was recognition of the complexity facing Canada as the importance of its
geostrategic location had created cumbersome solutions and the organisational structure had
to be reformed.45 The new structure comprises of four components, army, air force, navy and
Special Forces that generate highly specialised capabilities and combat forces. From a command
perspective; “CAF has one functional command that groups common national support
functions and capabilities (CANOSCOM), two operational commands that employ CAF
assets for the conduct of operations (Canada Command and CEFCOM), and a unified chain
of command with a dedicated unified joint staff at the military strategic-political-diplomatic
interface that helps the CDS to command the CAF, to carry out his national command
responsibilities, and to advise the government.”46 Finally, in 2012 the CAF conducted a
further modernisation programme and established the Canadian Joint Operations Command
(CJOC) and merged the Canada Command, the Canadian Expeditionary Force Command
and the Canadian Operational Support Command. CJOC’s role is to “anticipate and conduct
Canadian Forces operations, and develop, generate and integrate joint force capabilities for
operations.”47 In addition Canada also created a Directorate for Cybernetics, and that works
with Commander CJOC and Figure 3 presents a holistic overview of this new structure, based
on all changes that have taken place in the previous decade.
43 CDS Transformation Principle One, General Rick Hillier, CDS, The Maple Leaf, “CF Transformation: From Mission to Vision,” Vol. 8, No. 36,
(2005) p. 7.
44 Major-General Daniel Gosselin Hellyer’s Ghosts: Unification of the Canadian Forces is 40 years old – Part 1. (accessed on 20 April 2018)
http://www.journal.forces.gc.ca/vo9/no2/03-gosselin-eng.asp.
45 Jeff Tasseron, “Facts and Invariants: The Changing Context of Canadian Defence Policy,” Canadian Military Journal, Vol. 4, No. 2, (2003), 23.
46 Major-General Daniel Gosselin Hellyer’s Ghosts: Unification of the Canadian Forces is 40 years old – Part 2. (accessed on 20 April 2018)
http://www.journal.forces.gc.ca/vo9/no2/03-gosselin-eng.asp.
47 National Defence and the Canadian Armed Forces, CJOC, (accessed on 01 May 2018), http://www.forces.gc.ca/en/about-org-structure/
canadian-joint-operations-command.page.
100
Joint Force Command: The Need for Change
Chief of
Defence Staff
Strategic Joint
Staff
The following summary will reflect on the two JFC concepts that have been presented and will
reflect on common themes that were identified. The identification of four key themes were
used as a basis for discussing the core command and control issues discussed below.
Lessons Learned:
As posited previously, the initial model used by the Canadian Armed Forces continues to
be observed internationally as an approach not to be used and its evolution over the last five
years demonstrates what can be achieved when adhering to the contemporary model of a
JFC construct. Evidence does acknowledge that both countries learned lessons from previous
efforts to implement jointery and emphasis was put on the need to get individuals trained and
familiar with the JFC concept before creating and implementing a structure. This was certainly
the case with the NZDF and the CAF, particularly as they modernised their JFC over the recent
years. Capability planning is also something that is now completed at a joint level for the two
101
Joint Force Command: The Need for Change
militaries analysed and the NZDF uses a ‘future force concept’ to design and identify their
future capability requirements. Figure 4 provides a graphical representation of what a future
force concept resembles.
External Reviews:
Both nations have had external reviews forced upon them politically when there was a national
realisation that their previous existing structures were not fit for purpose. While the countries
did previously exhibit elements of jointery, there was a significant bias towards their respective
single Services, frequently to the detriment of their overall efficiency and effectiveness at
the operational level. A significant observation that was elucidated from the analysis is that
on completion of all of the external reviews, further enhanced levels of jointery was always
recommended and at no stage did any report call for the Services to become less joint.
Challenges:
The analysis has shown that each of the militaries reviewed have had similar challenges with
promoting the jointery mind-set and implementing the JFC concept. The development
of a suitable command and control system was pivotal in allowing both nations the ability
to design a system that was reflective of a contemporary military organisation. Each nation
has command invested in their CDS and this allows for the reporting lines to be clear
and concise, with one individual in charge. In all cases, the CDS is subordinate to their
respective Defence Ministers, as militaries should be, but on level par with the civilian
elements of the Defence Ministries (civilian staff). All individual services are subordinate
to the CDS but have equal standing at the management level. This issue is pertinent as it
was raised during the recent Canadian modernisation due to tension at the civil-military
level, and the new SJS ensures that the civil staffs do not assume functions that are within
the purview of the military staffs, and that the CDS can effectively command the CAF.
48 NZDF, FUTURE35, “Our Strategy to 2035”, New Zealand Defence Forces White Paper on Defence (2010): 5.
102
Joint Force Command: The Need for Change
As a force, the DF has not evolved when compared to other similar modern forces, such as,
those reviewed previously in the paper. The resultant impact of the land-centric command
and control legacy has had a consequential impact on the DF’s ability to promote jointery and
a JFC structure. It is noticeable that the staffing functions in DFHQ are aligned to the joint
functions ‘J1-J9’, particularly as no other services can fill these appointments. Figure 6 below
provides an alternate joint structure that could be used by the DF for a future JFC. Notable
points include; the creation of a Chief of Defence (CHOD) with overall control of the military,
a JFC Commander and Commander Joint Operations (CJO), thus allowing for a modern
command and control structure to be established, and the amalgamation of joint enablers
under the JFC, thus ensuring specialists such as the DF Special Forces have one commander.
This model would recognise that each geographically specialised form of military power is
vitally important, both in itself as a contributor to strategic effect, and as an enabling factor for
other contributing agents.52
49 Basil Liddell Hart, Thoughts on War, 1944.
50 Defence Forces, Defence Forces Capstone Document (Dublin, 2016) unpublished, 1-2.0
51 Defence Force Regulation A18, Military Command, (Dublin, 2015). 1-2.
52 Gray, The Future of Strategy, 95.
103
Joint Force Command: The Need for Change
In addition, the proposed new structure would allow the JFC Commander to become primus
inter pares and direct all operations through a truly joint system, within which, the function
of the single services, would be to raise, train and sustain forces for future DF operations, both
at home and overseas. Moreover, the creation of a unified chain of command would replace
the current opaque model that has never evolved to reflect best practice, thus aligning the
DF to more modern and interoperable structures, similar to its partners. Finally, the lack of a
credible and resourced joint cyber command is a notable omission in the current DF structure
and the transition to a new modern structure would ensure that the DF could be positioned
to meet current and future threats, as analysis has shown that the dogmatic adherence to a
‘conventional structure’ in an ‘unconventional world’ is hampering DF capability development.
Conclusion
This research sought to explore and answer the need for change within the DF and the
transition towards a Joint Force Command structure. Through the systematic analysis of the
concept of joint forces command and the evaluation of international applications of it, this
research has determined that the JFC concept is one that should be implemented within the
DF. The research has demonstrably shown that the benefits associated with the JFC concept
far outweigh the negatives and that the nations examined in this research have promoted the
concept is testament to its applicability and pertinence. While each nation faced challenges
and experienced difficulties with earlier command and control models, the intervention of
external review processes, driven by a political agenda successfully highlighted the deficiencies
with previous operating models. The recognition that change had to be introduced was
acknowledged and acted upon by each nation examined.
From a DF perspective there has never been an external review of the national command and
control structures that are currently in place. Any politically motivated changes that have been
implemented have traditionally been cost cutting exercises or personnel reductions and have
refused to address the overall command and control elements of the DF. It is both irregular
104
Joint Force Command: The Need for Change
and unprecedented that an organisation that claims to be a modern and innovative military
organisation still retains the command and control structure that was established almost one
hundred years previous. Furthermore, the inability of the Chief of Staff to have control over
the force he must manage is another systemic failure that must be addressed if the DF is to
evolve and develop into a more joint organisation. Based on the analysis of this research the
modern concept of a JFC does appear to be a much more efficient and contemporary means
of successfully managing military operations in an effective manner. In an attempt to provide
strategic direction and enable long-term capability planning the development of a ‘Future
Joint Force Concept’ is a strategy that would significantly assist the DF in creating and then
implementing a JFC. To fulfil this requirement, it will be necessary for the DF to evolve towards
a joint operating model in order to create the synergies and efficiencies required to achieve
a force that is affordable, sustainable and efficient. The DF’s culture, traditions and history
must play a part in creating and developing its future, however, at present its future is being
constrained by the hand of history that refuses to allow the organisation to evolve. The solution
is evident, the need for change, imminent. Only two options remain, adapt or die.
105
106
WHAT IMPLICATIONS WILL
ARTIFICIAL INTELLIGENCE
HAVE ON THE DEFENCE
FORCES OVER THE COMING
DECADES, AND ARE THEY
READY FOR THE ASSOCIATED
CHALLENGES THESE
DEVELOPMENTS
WILL INDUCE?
Comdt Ken Sheehan
115 Inf Bn, UNIFIL
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
Introduction
To people of a certain age, Artificial Intelligence (AI) will always be synonymous with the
attempts of Arnold Schwarzenegger’s T-800 to kill or save John Connor. The generation that
watched these attempts in the Terminator series are now in senior leadership positions within
the Irish Defence Forces, and it is possible that their perception of AI may be more driven by
these cultural references, rather than any knowledge of Boolean logic or neural networks.
AI is an incredibly complex sphere of science, and it is easy to get bogged down in terms and
concepts. A useful broad definition is the concept of machines using a “perception-cognition-
action (or decision making)” sequence to acquire human-like intelligence.1 For brevities sake,
developments can be thought of in three separate ways:
Artificial Narrow Intelligence (ANI) is task-specific and already exists. Examples include
image recognition, and voice assistants like Alexa.
Artificial General Intelligence (AGI) is considerably more complex, and does not exist. This
AGI describes human-level intelligence across a number of different tasks.
Artificial Super Intelligence (ASI) is a theoretical concept that describes super human level
intelligence across a number of different tasks. 2
Despite the potential of AGI and ASI, it is expected that ANI applications will dominate over
the next ten years, generating 99.5% of total AI revenue.3 How quickly technology will advance
and impact on society is unclear, with some estimates predicting that it will take between 20
and 40 years before the impacts on employment patterns are completely felt. 4
This paper will examine the potential impact of AI on the Defence Forces by firstly examining
the potential developments in the next ten years, focusing on larger militaries and their
potential use of AI. It is likely that the Defence Forces will continue to deploy overseas in
support of Peacekeeping operations, so it is important to consider how these new technologies
are going to influence our partners in other, larger militaries.
Secondly, as a small military with a limited budget, the potential areas where AI could assist the
Defence Forces will be considered. Computers excel at assisting in routine, predictable tasks.
These attributes may impact on AI’s potential contribution to Human Resources and logistical
processes, and the potential for use in the Defence Forces will be examined.
Finally, the readiness or otherwise, of the Defence Forces to adapt to the changes that AI
will bring as part of the Fourth Industrial Revolution will be examined. The Defence Forces
prioritisation of Information Technology will be considered through a People, Process,
Technology lens. It will be argued that the Defence Forces may struggle to adapt, and use AI
appropriately for an organisation of its size and goals.
1 Pant, A. (2018) ‘Future Warfare and Artificial Intelligence’, Institute for Defence Studies & Analyses, Occasional Paper 49, p. 4.
2 Price, M., Walker, S., & Wiley, W. (2018) ‘The Machine Beneath: Implications of Artificial Intelligence in Strategic Decision Making’, PRISM The
Journal of Complex Operations, Vol. 7(4), pp. 92-105, p. 96.
3 AI Forum New Zealand (2018) ‘AI Shaping a Future New Zealand’, AI Forum New Zealand, available: https://aiforum.org.nz/wp-content/
uploads/2018/07/AI-Report-2018_web-version.pdf [accessed 01 Jul 19], p. 35
4 AI Forum New Zealand (2018), Op Cit, 51.
108
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
109
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
system and Patriot anti-missile system. South Korea has deployed the Samsung Techwin SGR-A1
autonomous gun, which includes surveillance, tracking and firing technologies as part of its
border defences.15 The potential for these types of weapon systems to assist in the detection of
threats around a camp or a Forward Operating Base in a Peace Support Operation are clear.
110
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
Defence Forces values are explicitly linked with the way the organisation thinks about and
understands both leadership and promotion.25 Culturally, no matter how good the science is, it
is impossible to see how the Defence Forces could move towards an assessment method that is
not open and easily understandable. The idea that a leader is in anyway evaluated by something
that is not detectable to the human eye is likely not to be accepted within the organisations
culture, at least in the short term.
A third area where AI could be used in the Defence Forces within the next ten years is to
assist with anomaly detection in communications networks. Currently, analysis of network
traffic is generally carried out by specialists. Intrusion Detection Systems (IDS) could reduce
the Communications and Information Services (CIS) Corps specialists required to defend the
network, utilising the ability of ANI to recognise patterns.26 This could allow the CIS Corps to
redeploy personnel away from repetitive, but important tasks, to be better used elsewhere. There
are also other areas where the ability to detect change in patterns could improve our personnel
and processes in the short term. UK Police forces are already using predictive policing models
in an attempt to offset financial cuts.27 This type of technology may improve the Defence Forces
ability to detect changes in patterns across different domains.
111
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
how technology can be used as a force multiplier. The NZDF have committed significant
resources and time (€60.7 million over the next four years32) to the Network Enabled Army
programme. This programme is expected to last 15 years, and it intends to exploit advances
in information systems to drive change, including mitigating the NZ Army’s lack of numerical
strength.33 The Defence Forces, despite investing in technology such as the Virtual Desktop
Architecture system and the Software Defined Radio project, do not currently have a long term
strategy to ensure that the organisation can adapt its personnel, its processes and its regulations
to use technology appropriately.
From a process lens, the 2015 White Paper of Defence referred to responsibilities in cyber for
the first time. A Cyber event is assessed as having a very high impact and a moderate likelihood
on the National Risk Matrix. 34 While the Defence Organisation is “committed to participating
in the delivery of measures to improve the cyber security of the state” 35 it is difficult to see
how the Defence Forces is in a position to assist significantly in the cyber security of the state,
considering the current number of personnel, what the CIS Corps is tasked with supporting,
and the level of spending (CIS capital spending was €11.1 million36 in 2017). As technology
expands further, it is hard to envisage how the Defence Forces will keep up unless there is
some process change. The example of the Cyber Defence Unit of the Estonian Defence League
shows what is possible if an innovative approach is taken to how defence organisations mitigate
against the challenges posed by technology.37
Technically, there have been some real advances over the last ten years. Recent rollouts of
Sharepoint, 38 data centre innovation, 39 the Virtual Desktop Architecture Project 40 and
SITAWARE41 have shown that the Defence Forces currently retains the capability of delivering
technical solutions. There have also been attempts to ensure that Defence Forces is getting
value for money from these technical solutions, like the Chief of Staff’s innovation awards.
However, these technical advances have not been matched by changes in our structures to
provide support to these new technologies. As well as the personnel issues already outlined,
it could be argued the Defence Forces regulations have not kept pace with the changes in
technology, to, for example, ensure that routine administrative processes, are using technology
to its full potential.
AI is unique in a number of ways that will cause difficulties. As with most technical advances,
senior leadership within organisations will need to adapt, understand and prioritise AI before
32 Mark, R. (2019) ‘Next Stage of Network Enabled Army Programme to Begin’, Beehive, available: https://www.beehive.govt.nz/release/next-
stage-network-enabled-army-programme-begin [accessed 01 Jul 19]
33 New Zealand Defence Forces (2017) ‘Future Land Operating Concept 2035’, New Zealand Government, available: http://www.army.mil.nz/
downloads/pdf/public-docs/2017/20170626-future-land-operating-concept-2035.pdf [accessed 01 Jul 19], p. 34.
34 Department of Defence (2017) ‘National Risk Assessment 2017’, Department of Defence, available: https://www.defence.ie/system/files/
media/file-uploads/2018-07/national-risk-assessment-ireland-2017.pdf [accessed 01 Jul 19]
35 Department of Defence (2017) ‘DoD and DF Strategy Statement 2017-2020’, Department of Defence, available: https://www.defence.ie/
system/files/media/file-uploads/2018-06/ss2017_0.pdf [accessed 01 Jul 19]
36 McCarthy, S (2018) ‘Vote 36’, Comptroller and Auditor General, available: https://www.audit.gov.ie/en/Find-Report/Publications/2018/vote-
36.pdf [accessed 01 Jul 19]
37 Kaska, K., Osula, A. & Stinissen, J. (2013) ‘The Cyber Defence Unit of the Estonian Defence League’, NATO Cooperative Cyber Defence
Centre of Excellence, available: https://ccdcoe.org/uploads/2018/10/CDU_Analysis.pdf [accessed 01 Jul 19]
38 Spanish Point (2015) ‘Defence Forces and Spanish Point are awarded IT Professional Team of the Year’, Spanish Point, available: https://
www.spanishpoint.ie/news-blog/defence-forces-and-spanish-point-are-awarded-it-professional-team-of-the-year/ [accessed 01 Jul 19]
39 Tech Awards (2019) ‘Tech Excellence Awards 2019’, available: https://techawards.techcentral.ie/winners-2019/ [accessed 01 Jul 19]
40 Kehoe, P. (2018) ‘National Development Plan Funding’, Dail Eireann Debate, available: https://www.oireachtas.ie/en/debates/
question/2018-10-23/section/135/ [accessed 01 Jul 19]
41 Systematic (2019) ‘Ireland Conncets All Forces Through Sitaware’, Systematic, available: https://systematic.com/defence/cases/ireland-
connects-all-forces-through-sitaware/ [accessed 01 Jul 19]
112
What Implications will Artificial Intelligence have on the Defence Forces Over the Coming
Decades, and are they Ready for the Associated Challenges these Developments will Induce?
it could reach its potential. This process will not take place in a bubble, and it is likely to be
influenced by AI use in the wider society, with autonomous drones being one of the most likely
widespread, noticeable uses of the technology in the next ten years.42 How humans interact
and “trust” AI enabled systems is recognised as being a significant challenge and studies are
underway to investigate how these systems can “build trust” with humans. One concept being
developed is “explainable AI”, where the AI would “explain” the reasoning used to make
a choice.43
Conclusion
In 2017, Ireland was one of 25 European countries signing a declaration of cooperation on
AI.44 However, Ireland does not have a National AI strategy. This is essential if Ireland Inc. and
the Defence Forces are to consider how and why AI will be used. A recent New Zealand report
describes the risks of non-engagement with AI starkly – “shape or be shaped”.45
The Defence Forces is likely to encounter AI enabled systems within the next ten years on
Peace Support Operations and also in other limited areas to assist with repetitive tasks. The
ability of the Defence Forces to adapt is uncertain given the limited amount of CIS specialists
to implement, maintain and operate these systems.
AI has the potential to change warfare by delivering “violence at a greater volume and higher
velocity than ever before.”46 It does not take too much imagination to look at the 2018 Winter
Olympics Opening Ceremony, which was performed with the assistance of 1,218 autonomous
drones,47 and imagine changes to come. This paper has concentrated on how the Irish Defence
Forces and its partners in multi-national operations could use AI, however it has not considered
how non-friendly actors could use this technology. The “cost of entry” for simple applications
could be low, as large tech companies are making their machine-learning tools freely available.48
Militaries could be vulnerable if non-friendly actors combined AI with social media to perform
large disinformation campaigns.49 It is not hard to imagine how difficult this type of a scenario
would be to deal with if an overseas unit were targeted.
There are challenges ahead, but technology will continue to drive changes within our society
and our Defence Forces. Considering the responsibilities that the Defence Forces has to state
security, the nature of Ireland’s economy, and its foreign policy goals, if there is not a considered
engagement with the constant process of catching up with technology, not only is there a risk
of missing out on the benefits of technology, but also of becoming that little bit less relevant.
113
114
PATROLLING BELOW THE
HORIZON:
Addressing Ireland’s Awareness of our
Maritime Geospatial Domain.
Lt (NS) Shane Mulcahy
Staff Officer, Naval Operations Command Centre.
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
Abstract
In January 2008 off Alexandria Egypt, two merchant vessels anchored in order to wait out
an approaching weather front moving through the Mediterranean. Heavy wind and swell
conditions caused the ship’s anchors to drag along the seabed; a common occurrence
at sea. On this occasion however, the anchors severed five submarine communication
cables in the process, crippling communications systems connecting Europe, North
Africa, and the Middle East. The sole remaining telecom link buckled under the
transferred stress, disrupting the internet connectivity of more than 80 million people,
including governments and businesses in the Middle East and Asia.1 Notwithstanding
substantial costs of repair, the economic effect of this accidental and relatively short-
lived interruption was felt internationally, with the event linked to global oil prices and US
dollar fluctuations at the time.2 Eleven years on, what has been learned about protecting
these vital subsea communication links?
1 Rishi Sunak and James Stavridis, Undersea Cables: Indispensable, Insecure (Policy Exchange, 2017), 37.
2 John C. Dvorak, “Using the Internet as a Weapon,” (MarketWatch, 2008), 8.
3 Glover, B, History of the Atlantic Cable & Undersea Communication from the First Submarine Cable of 1850 to the Worldwide Fiber Optic
Network: Atlantic Cable Broadsides and Lithographs. (Canada, FTL Design, 2010).
4 Sechrist and Belfer, New Threats, Old Technology: Vulnerabilities in Undersea Communications Cable Network Management Systems,
(Center for Science and International Affairs 2012).
5 Caroline Elliott et al., “An Economic and Social Evaluation of the UK Subsea Cables Industry,” Monograph, 2016.
6 Sunak and Stavridis, Op Cit, 38.
116
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
What makes these cables so important? Within the 2.5 billion gigabytes of data produced
globally every day are on average, 500 million tweets, 294 billion emails, and 2.7 billion
Facebook likes. It also includes the 15 million daily financial transactions which keep the
global economy afloat, valued at over US$10 trillion, every 24 hours.7 The steady increase in
our data dependence has caused undersea cables to silently become the bedrock of a modern,
globally interdependent society. Considering Ireland’s geostrategic location, the lattice of
submarine cables surrounding our Ireland has been well described as the ‘corporate and
physical backbone layers of the Internet’.8
117
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
In December 2006, a 7.0 Mw earthquake triggered massive undersea landslides near the
160-mile-wide Luzon strait, which severed the vast majority of submarine cables linking internet
and phone services from North America to China, Hong Kong, Japan, Singapore, South
Korea, and Taiwan.12 Considering the geographic realities which caused multiple systems to be
placed in such close proximity, it is worth pointing out that the majority of transatlantic cables
transiting past the Irish coast do so through a funnel less than 100 miles wide.13
Unfortunately, the most potent risk to our subsea domain may not be a natural or accidental
one. If these vital information arteries can be susceptible to a dragging anchor or rogue
fishing net, we are left with a far more worrying question to address: What about a deliberate,
hostile act?
In terms of strategy, cable cutting is a legitimate and often utilised tactic. Within hours of
declaring war in 1914, pre-positioned Royal Navy assets quietly severed all five of Germany’s
vital trans-Atlantic undersea telegraph cables.14 A full century later, the annexation of Crimea
by Russia in 2014 was aided by ‘little green men’ who cut all but one of the cable connections
linking the Crimean peninsula to the rest of Ukraine (the sole remaining internet exchange
point was already under Russian control, being used to control the flow of disinformation to
portray the legitimacy of Russia’s military action).15
Subsea cables are by their very nature a soft military target. They are fragile and geographically
concentrated, often in remote and hard to monitor locations. They can be attacked with little
risk of loss of life, and any unwitnessed tampering can usually be plausibly denied (important
for anyone looking to exploit the grey areas of NATO Article 5 mutual responsibilities). The
relative ease of severing a subsea cable means that a threat can easily emanate from non-state
actors, and their susceptibility is heightened by the public knowledge of their positions; to avoid
accidental damage from fishing activity, charts providing accurate locations of the majority of
commercial cables are freely available in the public domain.16
Aside from cables being cut – tapping of subsea communication lines has been common
practice since the cold war.17 As evidenced by NSA whistle-blower Edward Snowden in 2013,
the practice of undersea cable tapping certainly hasn’t been curtailed in any way by advances
in cable design. On the surface, a modern fibre optic cable can be tapped in just minutes using
a handful of modest tools; at depth, military powerhouses like the United States have ensured
that their ability to listen at will has not been compromised.18 Ireland is most assuredly not
immune from the risk of tapping. The widely known but unacknowledged Russian ‘Spy ship’
YANTAR made headlines in 2015 when it was found loitering over subsea cables off the US
coast.19 Carrying two submersibles capable of working at depths of 6,000 meters, YANTAR
is no stranger to European, and even Irish, waters. With global interest in the wealth of
information travelling along our seabed, it’s not a case of preventing cables from being tapped;
118
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
governments, businesses, and even ordinary citizens should best assume that they are. With the
risk laid bare, what, if any, protection can the Defence Forces offer to this vital infrastructure?
This question must be considered not only from a capability standpoint, but also from a
legal one.
First of all, nations have tended not to own the communications cables linking them. Save
for a select number of military-focused links,20 economics dictate that trans-ocean cables are
predominantly privately owned and bankrolled by telecoms conglomerates or, more recently,
giants such as Facebook and Google.21 Afterall, subsea cables are expensive. The Southern
Cross Cable for example, linking the Australian and North American continents cost upwards
of US$1.5 billion.22 While the entrepreneurial approach to undersea communication has
been successful, it has led to a lack of clarity with regard to the international status of cable
infrastructure, and little protection at national government level.
Unlike the ship’s which lay them, subsea cables do not fly a flag, have no homeport, and
bear no legal association with any particular nationality. Numerous attempts have been made
to address this complicated status under international law. The 1884 Convention for the
Protection of Submarine Telegraph Cables was a first attempt to make interference with subsea
cables a punishable offence at a national level,23 followed by the 1958 Geneva Convention
on the High Seas, which protected the creation of undersea cables in international waters.24
The most recent and comprehensive legal consideration has been the 1982 United Nations
Convention on the Law of the Sea (UNCLOS), frequently referred to as a ‘constitution of the
seas’.25 This comprehensive convention, on which some 167 nations reached varying levels of
agreement, places significant theoretical protection on undersea cables in international waters,
but falls short in some vital practical aspects. One critical flaw in the protections offered lies
20 Thomas Nilsen, “Russia plans to lay a trans-Arctic fiber cable linking military installations”, The Independent Barents Observer, April 24,
2018.
21 Sunak and Stavridis, Op Cit.
22 Tara Davenport, “Submarine Cables, Cybersecurity and International Law: An Intersectional Analysis,” Catholic University Journal of Law and
Technology 24, no. 1 (2015).
23 Submarine Telegraph Act 1885, Chapter 49.
24 United Nations Convention on the High Seas 1958.
25 United Nations Convention on the Law of the Sea, (UNCLOS) 1982. Article 113.
119
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
in Article 113, which stops short of giving warships the right to board vessels suspected of
intentionally trying to damage undersea cables in international waters.26 Anything short of this
implicit power makes it almost impossible for naval powers of any nation to effectively deter
hostile vessels above or below the surface. While critical of the extent of these 1982 protections,
it must be remembered, that the birth of transatlantic fibre optics and our reliance on these
cable systems are all pre-dated by the 1982 UNCLOS agreement. Increased mandate for the
overt protection of these international networks would appear long overdue.
Some nations, having recognised the gap in international protections, have sought to fill the
void with policy solutions at a more local level. Australia and New Zealand, as Island nations
with communications-dependant economies, have introduced Cable Protection Zones (CPZs)
which provide a range of restrictions to prevent cable damage in sovereign waters.27 These CPZs
deliver the mandate for increased surveillance and intervention, as well as financial deterrents
of up to £250,000 for those found to be in breach.
Similarly, private companies have started to look at ways to protect their own investments
outside of existing conventions. Seismic sensors originally developed for the oil and gas industry
also have the ability to detect the vibrations created by surface or subsea vehicles operating in
their vicinity. These relatively low-cost sensors, placed around cable routes and other key subsea
infrastructures, can gather valuable information of a pending deliberate or accidental threat.28
Closer to home, the absence of assured legal footing makes the role of protection more difficult;
and increasingly grey. What mandate and methods remain to defend, protect, and support the
integrity of our maritime domain?
120
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
capabilities from surface assets, and a recent foray into autonomous underwater vehicle sensors.
Without systems capable of subsurface detection linked to data analysis systems ashore, the
Naval Service remains quite literally, lost in the dark.
But there does appear to be some flexibility in how the Naval Service shapes its own perspective.
A tentative tender process has commenced with the aim of equipping Ireland’s principal sea-
going agency with more versatile and capable platforms, supported by government’s white
paper vision. Increased mandate for further development in countermine and counter-IED
capabilities ensures continued focus on monitoring and intervention on the seabed. The
development of a highly deployable multi-role vessel concept provides scope for a platform
more suited to ocean governance roles. In this regard, the Naval Service is firmly on the road
to employing more capable systems to progress its ability to peer beneath the horizon, slowly
building geospatial awareness. However, these limited measures fall well short of achieving a
robust level of maritime domain awareness and protection. Further work is needed.
When it comes to delivering cost-effective sovereignty to the seabed, The Royal New Zealand
Navy’s recent procurement success with HMNZS MANAWANUI provides an example worth
following.32 Instead of looking for a brand-new hull to fill the diving and hydrographic capability
gap that had been identified, the New Zealand Defence Force instead examined over 150
existing offshore subsea support vessels to find the most suitable candidate for modification.
They identified the 85 metre-long MV Edda Fonn, a Norwegian multi-role support vessel built
in 2003; after ten months of refit and a total bill of approx. 103 Million NZ dollars (€60m,
equivalent to the cost of Ireland’s newest patrol vessel, LÉ GEORGE BERNARD SHAW),
New Zealand now have a vessel who’s capabilities, according to defence Minister Ron Mark,
represent “a domestic game changer for the South Pacific Region”.33
Fig 3 MV Edda Fonn, built in 2003, has been refit and repurposed as HMNZS MANAWANUI, New Zealand’s
most capable subsea support vessel. Source: marinetraffic.com
What does the future hold for Ireland’s sub-sea domain? In order to support potential future
assets like the Manawanui above, reviews of critical national infrastructure will be needed
to address the vulnerability of our undersea cable networks and consider the adequacy of
our maritime assets to counter this risk. Consideration should be given towards adopting
Protection Zones in particularly vulnerable areas with a high density of subsea networks. The
introduction of legislation to encourage the provision of sensors and sensor data around
undersea infrastructure and along cable routes. Finally, national encouragement towards the
121
Patrolling Below the Horizon:
Addressing Ireland’s Awareness of our Maritime Geospatial Domain.
adoption of modern international treaties which provide more robust protection of subsea
assets in sovereign and international waters.
With issues such as Brexit threatening to change regional balances of power, it is worth
remembering that the realities which made Ireland a key strategic landmark in the development
of global communication technology 150 years ago, still hold true. So long as Ireland remains
socially and economically married to the vital but delicate network of glass laying just offshore,
it is high time we considered protecting it.
122
IS ORGANISATIONAL CULTURE
A BARRIER TO CHANGE IN
THE DEFENCE FORCES?
Comdt Michael Hosback
Instructor, Command & Staff School
Is Organisational Culture a Barrier
to Change in The Defence Forces?
Abstract
This paper is an abridged version of a Master’s Thesis completed on the subject of
Defence Forces (DF) organisational culture, examining whether specific elements
of the DF cultural construct may be acting as a barrier to the effective integration of
specialised units. Organisational culture is a complex topic, increasingly the subject
of attention in terms of discussions of organisational effectiveness. Essentially culture
is to the organisation as personality is to the individual. The use of Schein’s model
of organisational culture, widely utilised in DF Leadership Doctrine, as a framework
to understand elements of culture is introduced and a cultural profile of the DF is
provided (using a representative sample of 150 personnel). Analysis of the constructed
culture profile indicates that there is a significant difference between the espoused
values of the DF as outlined in Leadership doctrine and the beliefs held by serving
personnel about the nature of DF organisational culture. The impact of this difference
between espoused values and unconscious beliefs on organisational effectiveness and
organisational ability to manage change and transformation are outlined. Additionally the
extent to which personnel’s perception of organisational values has changed over time is
explored, reflecting on civil military relations and the distinct difference between climate
and culture.
Introduction
The recent report of the Policing Authority on “Changing policing in Ireland” identified
organisational culture as one of the key enablers of organisational change and renewal.1 The
Report suggested that one barrier to effective modernisation within An Garda Síochána (AGS)
results from the impetus to change not being felt by personnel at the front line. The review also
referenced the results of a recent AGS cultural audit, which indicated considerable scepticism
amongst rank and file personnel towards modernisation. The Defence Forces has not to date
completed a comparable cultural audit of personnel to determine their attitudes towards
innovation and transformation. This is somewhat surprising given the focus in recent times
on workplace climate within the organisation and the understanding that climate is a current
manifestation of deeper cultural issues, topics which have been the source of considerable
public and political commentary since the publication of the 2015 Climate Survey in particular.
This paper is an abridged version of a thesis completed on the topic of DF organisational
culture. This topic is assessed as being particularly relevant given the focus of workplace climate
discussions has mainly taken place without consideration of what constitutes DF culture.
Prevailing academic opinion indicates that workplace climate change is unlikely to be successful
if not informed by an appreciation of underlying culture. This would suggest that the DF, in
addressing workplace climate issues, might have developed an incomplete visualisation of its
current operating environment.
The paper first outlines an overview of what constitutes organisational culture. The
Organisational Culture Assessment Instrument (OCAI) is then introduced and the
methodology through which the OCAI was used to complete a cultural profile of the DF
outlined. The results of the organisational culture profile and associated analysis are presented.
1 Policing Authority of Ireland, Monitoring and Assessment of the measures taken by An Garda Siochána to implement the recommendations of
the Garda Inspectorate Report on Changing policing in Ireland, 7th Report (Dublin: Government Printing Office, April 2019).
124
Is Organisational Culture a Barrier
to Change in The Defence Forces?
2 Shawn Parr, “Culture Eats Strategy for Lunch”, Fast Company, Jan 2012, accessed 04 April 2018, https://www.fastcompany.com/1810674/
culture-eats-strategy-for-lunch.
3 Ibid.
4 Rob Goffee and Gareth Jones, “What Holds the Modern Company Together,” Harvard Business Review 1 (Nov-Dec 1996): 8 – 23, Accessed
25 Oct 2018, https://hbr.org/1996/11/what-holds-the-modern-company-together.
5 Don. M Snider, “An Uninformed Debate About Military Culture”, Orbis 43, no.1 (Winter, 1999):14
6 Williamson Murray, “Does Military Culture Matter”, Orbis 43, no. 1 (Winter, 1999): 27.
125
Is Organisational Culture a Barrier
to Change in The Defence Forces?
As the importance of culture, and specifically organisational culture, has come to receive greater
recognition, a number of theories and definitions that attempt to encapsulate the concept
have been put forward.7 Schein’s theory of organisational culture is utilised in this paper as
a theoretical framework as it is heavily influences DF leadership doctrine. Schein defines
culture as:
A pattern of basic assumptions that a given group has invented, discovered, or developed in learning
to cope with its problems of external adaptation and internal integration, and that have worked
well enough to be considered valid and, therefore, to be taught to new members as the correct way to
perceive, think, and feel as related to those problems.8
Schein posits a model for understanding organisational culture consisting of three cultural
levels. The first and easiest discerned level is that of artefacts as they represent a physical
manifestation of organisational culture. This can be as simple as the ways in which members
of the group dress and speak to one another, their participation in ceremonial events and the
myths and stories that members of the culture share with one another. Schein warns that while
the artefact level of the cultural model is easy to observe it can be difficult to decipher and it
is “especially dangerous to try and infer deeper assumptions from artefacts alone because one’s
interpretations will be projections of one’s own feelings and reactions”.9
The next level of culture identified by Schein is that of espoused values. Espoused values
represent what the organisation says about itself to others or the way in which organisations
may represent their goals and summarise their own cultures. Critically Schein contends
that cultural difficulties arise when espoused values are contradictory and inconsistent with
observed behaviour.
The foundation of Schein’s model is the presence of underlying basic assumptions. These are
the elements of culture that are so ingrained in an organisation that its members take them
for granted in the absence of conscious thought. Schein contends that when basic assumptions
7 Jay M. Shafritz, J. Steven Ott, and Jong Suk Jang, Classics of Organization Theory, 8th Ed. (Boston, MA: Cengage Learning, 2015), 294.
8 Edgar. H Schein, Organizational Culture and Leadership, 2nd Ed. (San Francisco, CA: Jossey-Bass, Inc.,1992), 12
9 Ibid., 22.
10 Source: Schein, On Schein’s triangle Model (Research Gate, https://www.researchgate.net/figure/pn=Scheins-Triangle-Model-on-
Organisational Culture_fig4_301201939, Oct 10 2018).
126
Is Organisational Culture a Barrier
to Change in the Defence Forces?
are strongly held in a group, members will find behaviour that is based on any other
premise inconceivable.11
A significant utility of the model developed by Schein is its aid in understanding cultural barriers
to adaptation. In organisations where basic assumptions are deep-rooted, deep anxiety can
result from the development of mechanisms or viewpoints that contradict those assumptions.
In order to pre-empt this, Schein argues that groups will unknowingly distort, deny, project
or even falsify what is going on around them to avoid conflict with basic assumptions. This
framing of a group viewpoint influenced by an organisation’s culture can clearly act as a
significant impediment to change and integration.12
Methodology
The Organisational Culture Assessment Instrument (OCAI) is a validated research method
specifically designed to examine and assess organisational culture developed by Cameron
and Quinn. The OCAI utilises a structured questionnaire where participants are requested
to rate their organisation in a number of dimensions. These are Dominant Characteristics,
Organisational Leadership, Management of Employees, Organisational Glue, Strategic
Emphasis and Criteria of Success.
Data analysis enables the creation of a visual representation of the current (now) and desired (+
five years) status of an organisation’s culture determining the extent of internal versus external
focus and flexibility versus control. The model also use the intersection of these dimensions
to group organisational culture into four specific quadrants; the Clan (collaborative), Adhocracy
(creative), Hierarchy (controlling) and Market (competitive) quadrants. Each quadrant is
representative of different elements of organisational culture. If an organisation demonstrates
a tendency to be hierarchical in nature for example then clear lines of authority, standardised
rules and procedures and control and accountability mechanisms are valued as keys to success.
Effective leaders in this type of environment will be good coordinators and organisers who will
prioritise a smooth running organisation. Formal rules and policies are valued. Conversely
the Adhocracy culture is identified as a dynamic, entrepreneurial and creative workplace.
Personnel are risk takers and leadership is visionary, innovative and oriented. Commitment to
experimentation and innovation are high. The indications provided by the competing values
framework for organisational effectiveness and culture are outlined at Figure 2 below.
11 Ibid, 25.
12 Schein, Organizational Culture and Leadership, 22.
127
Is Organisational Culture a Barrier
to Change in the Defence Forces?
13 Source: Cameron and Quinn, Competing Values Framework of Organizational Culture (Research Gate, https://www.researchgate.net/figure/
Competing-Values-Framework-adapted-from-Cameron-Quinn-2011_fig1_317592354, April 4, 2019).
14 Source: Pierce, Is the Organizational Culture of the US Army Congruent with the Professional Development of its Senior Level Officer
Corps? (Global Security, https://www.globalsecurity.org/military/library/report/2010/ssi_pierce.pdf, January 15, 2019), page 57.
128
Is Organisational Culture a Barrier
to Change in the Defence Forces?
Clan Adhocracy
Int Ext
(Collaborate) (Create)
er er
nal nal
Fo Fo
cu cu
s s
Internal Focus External Focus
an an
and Integration and Integration
d d
Int Dif
eg fer
rat en
io tia
Hierarchy Market tio
n (Control) (Compete) n
The study population for quantitative analysis of the DF population was comprised of one
hundred and fifty service personnel (one hundred and fifty being identified by Cameron and
Quinn as a statistically significant sample size representative of organisational thought). This
sample size is comprised of a representative body from all ranks up to that of Commandant
thereby allowing the computation of differences in value scores to be calculated across the rank
structure. The sample body was comprised of personnel with between two and twenty years of
service in the DF.Figure 4 above represents the results of the OCAI distributed to members of
the DF as part of this study. The ‘now’ line indicates respondent’s current assessment of the
prevailing culture of the DF. The ‘preferred’ line is what those same respondents indicated
that they would like the cultural construct to be in five years. The same data is presented in
Table 1 below.
Numeric Values Irish Defence Forces Culture Model
The model indicates that the current membership of the DF perceives the culture of their
organisation to be imbalanced and weighted in favour of a Market type profile. This cultural
dominance indicates that personnel perceive of themselves as being members of a culture that
is driven primarily by the achievement of goals, is tough and demanding on personnel and
is focused on results. It should be noted, that the term Market is not synonymous with the
marketplace, as may be assumed, but refers to the type of organisation that is oriented towards
15 Michael Hosback, “Is the Organisational Culture of the Irish Defence Forces acting as a barrier to the effective integration of Special
Operations Forces” Master’s Thesis, Fort Leavenworth, Kansas, (2019).
16 Ibid
129
Is Organisational Culture a Barrier
to Change in the Defence Forces?
responsiveness to the external environment instead of internal affairs. The leadership type
associated with a Market culture is one of hard driving competitiveness, highly focused on
satisfying the demands of the external environment. Participants also indicated a significant
perception that the DF demonstrates a Hierarchical type organisational culture. The hierarchical
environment is one in which clear lines of decision-making, authority, standardised rules and
procedures, control and accountability are valued as the keys to success. Day to day actions tend
to be governed by procedural mechanisms and effective leaders are coordinators and organisers.
In the long term, the goals of the organisation are predictability and stability. Consensus in the
hierarchical organisation is achieved by adherence to rules and policies.
The extent to which these results are demonstrated across the rank structure are
outlined below.
Numeric Values Irish Defence Forces Culture Model Cross Rank Comparison
Captain Rank
Now Value 20.05 15.85 34.66 29.41
Preferred Value 30.75 22.16 22.62 24.45
Commandant Rank
Now Value 16.78 11.30 36.85 35.05
Preferred Value 28.78 23.48 21.65 26.07
Table 2 – Numeric Values Irish Defence Forces Culture Model Cross Rank Comparison17
17 Hosback, Op Cit.
130
Is Organisational Culture a Barrier
to Change in the Defence Forces?
Respondents consistently rated the Clan and Adhocracy culture types as least congruous with
their perception of the organisations current profile. The extent to which these results are
reflected, with only slight numeric deviation, across the rank structure are also significant.
They suggest that the same perception, possibly accepting slight change reflecting experience,
is consistent across the population, at least up until the rank of Commandant.
Given the DF espousal to practice a mission command type leadership doctrine and to be
a learning organisation, these results are discouraging. The espoused culture of the DF (the
learning organisation) is best represented by the Adhocracy culture type, one in which innovation
and transformation are encouraged. This suggests that there is a dissonance between what the
organisation suggests its values are and what surveyed personnel believe those values to be
in actuality.
The results of this analysis suggest that personnel hold the opinion that the leadership of
the defence organisation values the fulfilment of externally mandated requirements at the
expense of personnel development. They consider that the organisation is primarily concerned
with achieving mandated tasks, through rigid control structures and possesses a management
style which is characterised by strict adherence to regulation and which contravenes the DF
espoused values. The results indicate that the capacity for building a cohesive organisation
characterised by effective teamwork and built on trust, as espoused by DF doctrine, is currently
inhibited in the organisations cultural construct.
Cameron and Quinn have indicated that “discrepancies between the ‘now’ profile and the
‘preferred profile’ of between five and ten points usually indicate the need for a substantial
culture change effort”.18 Indeed, in the representative culture model of the US Army outlined
at Figure 3 discrepancies in perceived versus espoused culture indicated in the results were
the impetus for substantial cultural change initiatives. It is apparent that in this case a major
culture change initiative was initiated in a situation where the score discrepancies were not as
stark as that displayed in the model developed here for the DF.
Numeric Values US Army Culture Model
Pierce’s findings in the above referenced Table and associated research are that “the characteristics
of the Army professional culture are not supportive of long term environmental adaptability,
flexibility and innovation”.20 The current failure to acknowledge the requirement for cultural
understanding, evidenced by lack of existing analysis, farther supports the contention of
incomplete situational awareness.
18 Kim S. Cameron and Robert E. Quinn, Diagnosing and Changing Organizational Culture: Based On the Competing Values Framework, 83.
19 James G. Pierce, “Is the Organizational Culture of the US army Congruent with the Professional Development of its Senior Level Officer
Corps?” (Letort Papers, US Army War College, Strategic Studies Institute, Carlisle, PA, 30 September 2010), 57.
20 Ibid., 52.
131
Is Organisational Culture a Barrier
to Change in the Defence Forces?
Conclusions
The current organisational profile of the DF as indicated by this research is inconsistent
with the organisation’s espoused values as enshrined in DF leadership doctrine. The cultural
model presented by this analysis indicates that of four specifically identified cultural types
outlined, the current profile of the DF is least like that which the organisation professes to
possess; the learning organisation. The research suggests that there is a dissonance between the
espoused values of the DF and the unconscious beliefs of members. It also indicates that the
current organisational climate of the DF is not disposed towards innovative behaviour. This
is a negative outcome for the DF as innovation and flexibility are two key characteristics it has
identified as necessary to succeed in the future operating environment.
Low levels of group cohesion and morale indicated by the 2015 climate survey support the
accuracy of a low clan culture organisation profile for the DF as evidenced in this research.
When considered in conjunction with the work of O’Brien (2013) who asserted that personnel
do feel an affinity towards DF values and feel that they are indicative of DF culture this would
suggest that the foundations of DF organisational culture are being eroded over time and
specifically that significant erosion has taken place since 2013.21 The Climate Survey revealed
large levels of dissatisfaction with life in the DF, particularly since the reorganisation and
downsizing in 2012 and the significant adjustments to pay, conditions and structure as a
result of the prevailing economic environment. This dissatisfaction has been characterised by
the significant and operationally damaging loss of personnel in recent years. The dissonance
between espoused values and perception of personnel surrounding organisational culture are
suggestive of an increasing disconnect between defence management and the personnel of the
DF, reflected in contemporary commentary.
A great deal of time and energy has been invested in recent years in the investigation and
classification of workplace phenomenon in the DF. Engagement in these areas is the subject of
ongoing consultation and revision. Training practices and interpersonal relationship policies
in the DF continue to be subject to review and effective oversight. It is arguable however that
the DF focus on climate without an effective appreciation of the established culture of the
organisation is erroneous. Attempts to address work place climate change are unlikely to
be successful in the short term as a result of a lack of awareness of cultural underpinnings
of organisational frames of reference. Climate is more easily measured than culture, which
perhaps explains why organisations have a tendency to engage in climatic introspection without
properly understanding the unconscious belief system that affects personnel. This research
suggests however that despite associated difficulties there is a requirement for the DF to be
more cognisant of the effect of organizational culture on workplace climate. The lack of
understanding of a common cultural basis for the DF is unfortunate given the widely accepted
levels of organisational culture as developed and postulated by Schein and acknowledged
by the DF in leadership doctrine. There are measures that the DF can take however to
address the perceived disconnect between espoused values and the beliefs of personnel. It is
noteworthy that the survey results indicated that personnel expressed a noted desire to move
towards a learning organisation culture in the medium term and expressed a preference for
an organisational culture more closely reflective of espoused DF values. The key takeaway for
21 Darragh O’Brien, “Culture Eats Strategy for Breakfast but what is the Prevailing Culture of Óglaigh na hÉireann” (Master’s Thesis, National
University of Ireland, Maynooth, 2013).
132
Is Organisational Culture a Barrier
to Change in the Defence Forces?
the DF in this regard that a considered approach to cultural change supported by a more wide
ranging cultural audit and examining the existing reasons for the differences between espoused
values and beliefs of personnel is likely to contribute to effective change.
Previous studies of DF organisational culture have recognised the importance and impact
civil military relations in this area. Despite this knowledge it is arguable the DF has failed to
effectively educate their personnel in the importance of the civil-military relationship and in
particular the role and space for dissent or disagreement in the civil military sphere. Since the
time of writing of the two previous theses specific to the DF referenced here (O’Brien in 2013
and Crummey in 2014 respectively),22 the findings of this research indicate that ambivalence
surrounding the status of the military, on the part of military personnel, may be a contributing
factor to an undermining of military culture in Ireland. It is assessed as probable that the
current construct of the defence organisation, which limits military control of the levers of
organisational innovation (limited control of finance, restricted ability to restructure) may
be acting as an impediment in this regard and contributing to the impression of cultural
dissonance amongst serving personnel. Effective climate and cultural change measures are both
frustrated by the relative inability of DF leadership to take minimal ownership of the levers of
organisational change.
Given the current status of discourse surrounding resourcing of defence in the Irish model,
it is not speculative to state that lack of understanding of defined roles has impacted on the
operational capability of the DF. It is also apparent that the appreciation of DF personnel for
traditional values is likely to deteriorate further unless these issues are addressed.
22 Declan Crummey, “Exploring Dissent in Civil Military Relations” (Master’s Thesis, National University of Ireland, Maynooth, Ireland, 2014).
133
134
“NATIONAL CYBER
DETERRENCE AND THE
IRISH DEFENCE FORCES’
CONTRIBUTION”
Caitríona Heinl
Director of The Azure Forum for Contemporary Security Strategy, Ireland.
“National cyber deterrence and
the Irish Defence Forces’ contribution”
Abstract
There is a significant rethinking of deterrence and cyber deterrence being conducted
in many countries. This article will explore how other countries and military forces are
now approaching these questions with a view to adapting such thinking to suit the Irish
national security context. New national security strategies and second-generation cyber
strategies must now integrate such developments.
If it is expected that we will see even closer and more rapid integration of civil and military
agencies in the deterrence of and response to cyber aggression, how could (and should)
this be developed in Ireland? In the wake of tackling contemporary cyber aggression
and grey zone conflict during peacetime, the author will explore how both caution and
willingness to bring about constructive change are beginning to be exercised in other
states (and by extension may need to be exercised in Ireland) when questioning, and
potentially modifying, the traditional role of military for 21st Century risks.
Introduction
Even where adverse state activity within the cyber sphere in Ireland may not be immediately
evident, it would make little sense to not examine how trends elsewhere could unfold were they
to occur in the State by identifying appropriate responses and mitigation measures for persistent
and multi-faceted cyber aggression.1 Foreign states’ ability to impact Irish security in the cyber
sphere will continue to be dependent upon the Irish state’s capacity and continuing willingness
to take additional actions to prevent, reduce, deter and respond to espionage activities as well
as malevolent and hostile state activity. Such deterrence is traditionally understood to work
by conveying the message that costs – including political, economic, diplomatic and strategic
- will be imposed on a given action, either by making success more difficult or by threatening
a punitive response, so that a malevolent actor will likely consider the benefits of action
outweighed by the costs or punishment and thus choose not to act.2
A simple understanding of cyber deterrence is laid out within the EU’s latest cyber strategy
whereby effective deterrence is achievable if a framework of measures are put in place that
are both credible and dissuasive.3 The EU strategy argues that perpetrators who do not fear
reprisal will only continue their activities unless the chances of being caught and punished
by joint diplomatic or political response are increased. Ireland is not considered immune and
there is a belief that groups linked to other states are in Ireland and carrying out operations
in the State.4 Stronger, coordinated cross-governmental measures and responses will continue
to be needed nationally to address present-day cyber aggression – and like the EU strategy
lays bare, these steps must be both credible and dissuasive. At the time of writing, the still
applicable Irish National Cyber Security Strategy dating back to 2015 does indeed explain
that the strategy presents a cross-government framework for ensuring cyberspace remains safe,
secure and reliable with an emphasis on task-sharing and building trust between stakeholders.5
1 This adapted article comprises thinking based on a number of “think pieces” and speaking engagements by the author throughout 2019.
These include: “Food for thought: The cybersecurity landscape and role of the military”, 8 May 2019; and “Russia and China – Their impact on
Irish security from a cyber perspective”, 30 May 2019.
2 Wilton Park, “Military operations in cyberspace”, 5-7 September 2018.
See also HM Government, “National Cyber Security Strategy 2016-2021”, 2016, 47.
3 European Commission and High Representative of the Union for Foreign Affairs and Security Policy Joint Communication to the European
Parliament and the Council, “Resilience, Deterrence and Defence: Building strong cybersecurity for the EU”, 13 July 2017, 12.
4 Anonymous speaker, “Cyber Security Transatlantic Policy Forum”, Killarney Economic Conference, 10 May 2019.
5 Department of Communications, Energy & Natural Resources, “National Cyber Security Strategy 2015-2017”, Government of Ireland, 2.
At the time of writing, the second cyber strategy is due to be published.
136
“National cyber deterrence and
the Irish Defence Forces’ contribution”
The strategy further observes the changing nature of these technologies, rightly stating that
flexibility will be needed for the strategy’s implementation in an adaptive manner.6
Nonetheless, experts are scrambling to unpack the multi-level characteristics of cyber conflict
that include ideological, policing, security and economic dimensions – astutely described as a
humbling experience where we are advised to ideally exercise intellectual, political and strategic
humility in this space.7 The national security communities and militaries of technologically
advanced democracies are still trying to better understand the character and implications of the
phases of potential conflict in cyberspace - our understanding of cyberspace as an environment,
of conflict in that environment, and of the military role in such conflict is still work in progress.8
It is thus safe to conclude that the military role in advanced democratic states’ endeavours,
including Ireland, to deter and manage the use by state or non-state actors of contemporary
and future cyber capabilities needs both significant strategic refinement and investment.
Experts now ask, for instance, what exactly the role of the military is where there are several
types of persistent cyber activity such as espionage, attack, influence campaigns, and races to
acquire strategic future capabilities. What is the role of the military during “unpeace” defined
by Lucas Kello in his recent book as “mid-spectrum rivalry lying below the physically destructive
threshold of interstate violence but whose harmful effects far suRPAS the tolerable level of
peacetime competition and possibly even of war”. In other words, how should we analyse
and manage military operations that are in fact taking place in cyberspace?9 This begs the
deeper question as to how the Irish government should now approach cyber deterrence where
the nature of traditional deterrence is already evolving – military doctrine is beginning to
recognise that it is “no longer a defensive or semi-passive theory based on conveying intent and
capability; instead, it now has to involve active measures as part of a constant conflict below the
traditional threshold of what used to be called war”.10
This article argues that a number of steps can be taken to better enhance Ireland’s cyber
resilience, deterrence, and response in the 21st Century. This includes work that continues
to strengthen cyber resilience to reduce vulnerability, and to allow government freedom of
action for responding to and preventing future malevolent activity. These steps, which are
described in more detail below, include the following actions: (1) Continue to enhance cyber
resilience as part of deterrence by denial; (2) Increase all-source intelligence; (3) Align cyber
deterrence alongside national deterrence frameworks; (4) Unpack and adapt contemporary
military thinking on 21st Century cyber risks; (5) Recognise the Defence Forces’ workforce
as a critical cyber asset; (6) Adapting EU frameworks at national level for response to
malicious cyber activities; (7) Continue to increase the State’s international action and
engagement; and (8) Continue efforts to protect Ireland’s reputation vis-à-vis surveillance and
cybersecurity issues.
6 Department of Communications, Energy & Natural Resources, “National Cyber Security Strategy 2015-2017”, Government of Ireland, 3.
7 Wilton Park, “Military operations in cyberspace”, 5-7 September 2018.
8 Ibid., 5-7.
9 Ibid., 5-7.
10 Ministry of Defence, “Deterrence: the Defence Contribution”, Joint Doctrine Note 1/19, UK Government, February 2019.
137
“National cyber deterrence and
the Irish Defence Forces’ contribution”
138
“National cyber deterrence and
the Irish Defence Forces’ contribution”
osint, and humint (including foreign capabilities) in combination with technical attribution
where technical attribution alone is not sufficient. This situation is currently exacerbated
given concerns that the increasing use of publicly and commercially available cyber tools is
increasing the volume of unattributed cyber activity globally and the risk of misattribution and
misdirected responses by both governments and the private sector is higher.17 In other words,
cyber challenges should likely now be a forcing function to bring about wider changes in the
Irish national security apparatus.
139
“National cyber deterrence and
the Irish Defence Forces’ contribution”
include civil-military cooperation whereby the Irish Defence Forces continue the strong culture
of cooperation between the National Cyber Security Centre (NCSC) and Defence Forces in
areas such as development of technical skill sets, technical information sharing and exercise
participation. The Defence Forces must also maintain a capability in the area of cybersecurity
to protect its own networks and users. Moreover, a Service Level Agreement was due to be
formalised with the Department of Defence to include a mechanism for sharing technical
expertise in the event of a national cyber incident or emergency. Specifically, two members
of the Defence Forces are generally seconded to NCSC (albeit dependent on the Defence
Forces having two officers to second which seems a challenging ask given the current exodus
of Defence Forces’ officers).19 In July 2019, the Defence Forces’ internal cybersecurity unit
was shut down because of a lack of resources and qualified staff, and they are no longer in a
position to provide staff to NCSC.20
In any case, the NSCS maintains close cooperation with the Defence Forces and An Garda
Síochána on national security issues with this secondment arrangement for both entities.21
The 2015 Defence White Paper also observes that the Department of Communications has
lead responsibilities relating to cybersecurity and the primary focus of the Department of
Defence and Defence Forces will remain the protection of Defence networks, but in emergency
situations, once Defence systems are supported, they will provide support to the CSIRT-IE
team. Nevertheless, it seems uncertain that the Irish Defence Forces can could currently
assist in past months in the event of a significant cyber crisis or national cyber-attack given
the media reporting of the more recent standing down of the Defence Forces’ cybersecurity
unit. Moreover, the ability to routinely and effectively defend and protect the Defence Forces’
networks from cyber-attacks and intrusions, which is regarded as an essential capability that
must be retained and developed, must now beshould have been more seriously called into
question at the highest levels if this reporting is accurate.22
Notably, these objectives do not seem to include advanced military strategic thinking on cyber
matters. These developments in Ireland seriously call into the question the ability of the State
to implement a credible and dissuasive deterrence framework with a defence contribution. This
is particularly concerning where other important questions about the role of military in these
types of contemporary “conflict” and “unpeace” should be addressed.23 Such questions that are
currently being explored in other advanced economies include the following: (1) Is the role of
military to fight in the traditional sense of an action/reaction struggle with an adversary? The
latest United States Department of Defense (DoD) cyber strategy posits, for instance, that its
military’s ability to fight and win wars in any domain, including cyberspace, is a foundational
national security requirement to deter aggression including cyber-attacks – it will now “defend
forward” to halt or degrade cyberspace operations targeting the DoD which could be construed
as pre-emptive behaviour. Nonetheless, experts are continuing to unpack the meaning of such
new strategies; (2); Is the military’s task to contain hostile actions in cyberspace and to prevent
them spreading to and compromising military activity in conventional domains like land, sea,
air and space?; (3) Should this defensive function be extended to society more broadly, with
military tasked not just to defend their own networks and platforms but to also ensure the
19 White Paper on Defence, Government of Ireland, August 2015, 43.
20 John Mooney, “Lack of staff stops army cyber-security team”, The Sunday Times, 7 July 2019.
21 Department of Communications, Climate Action & Environment, “National Cyber Security Strategy Draft Public Consultation”, March 2019, 3.
22 White Paper on Defence, Government of Ireland, August 2015, 63.
23 Wilton Park, “Military operations in cyberspace”, 5-7 September 2018.
140
“National cyber deterrence and
the Irish Defence Forces’ contribution”
resilience of society’s critical infrastructure as a whole? Again, the U.S. DoD is now working to
defend, when directed, non-DoD critical infrastructure and Defense Industrial Base entities. It
will work (including by defending forward) to pre-empt, defeat or deter malicious cyber activity
targeting U.S. critical infrastructure that could cause a significant cyber incident “regardless
of whether that incident would impact DoD’s warfighting readiness or capability”; (4) Are
military-related activities such as cyber defence and resilience the most that can be expected of
military deterrence in cyberspace, or should the role of military be more organisational than
operational? For example, should military have a liaison and coordination function intended
to ensure integrated cross-governmental and intra-alliance responses?; and (5) Is there a need,
as laid out in the UK’s national cyber strategy, to improve the focus of intelligence agencies,
law enforcement and military in coordination with international partner agencies to identify,
anticipate and disrupt hostile cyber activities by obtaining pre-emptive intelligence on the
intent and capabilities of malevolent state and non-state actors?24 The U.S. DoD also alludes
to the need to increase “bi-directional” information sharing to advance mutual interests with
allies and partners.25
What is certain from recent expert reports is that militaries cannot effectively undertake
this analysis on their own and they must ideally be conducted as part of a “comprehensive,
integrated civil-military approach to conflict in cyberspace”. Nor is cyberspace seen to be
exclusively a military responsibility. Instead, it is recommended that there should be effective
coordination of civil-military capacity if cyber activities – of all kinds and at whatever levels –
are to be deterred and defeated. It is argued that military operations in cyberspace should be
fought as part of a comprehensive integrated civil-military approach in which civil and military
efforts are interdependent and thus more effective. A recent Wilton Park report on military
operations, which draws on the findings of key thought leaders and government representatives,
emphasises that civil-military cooperation is no longer optional and it is expected that we will
see even closer and more rapid integration of civil and military agencies in the deterrence of
and response to cyber aggression. This concept is known as fusion doctrine in the United
Kingdom whereby UK military operations in cyberspace should be seen as only one element
of a full spectrum cross-governmental strategic approach so that political leadership can at all
times receive advice from military commanders as to what military operations can and cannot
achieve in cyberspace. However, experts’ contributions in the Wilton Park report accept that
deterrence of cyber-attacks that constitute use of force seems to remain relatively straightforward
insofar as it comprises the traditional combination of denial and punishment. However, it is
more challenging where malicious activity falls below the threshold of the use of force, thus
calling for more nuanced positions, including during peacetime.
The EU also considers that it is well placed to promote synergies between military and civilian
efforts given the blurring lines between cyber defence and cybersecurity and the dual use nature
of cyber tools and technologies as well as the very different EU Member State approaches.26
While the United States DoD is now tasked to respond to cyber-enabled campaigns that erode
U.S. military advantages, threaten its infrastructure and reduce its economic prosperity. It will
work to expose, disrupt and degrade cyber activity threatening U.S. interests, strengthening the
24 See the United Kingdom’s approach: HM Government, “National Cyber Security Strategy 2016-2021”, 2016, 28.
25 United States Department of Defense, “Summary: Department of Defense Cyber Strategy 2018”, September 2018, 2.
26 European Commission and High Representative of the Union for Foreign Affairs and Security Policy, Joint Communication to the European
Parliament and the Council, “Resilience, Deterrence and Defence: Building strong cybersecurity for the EU”, 13 September 2017.
141
“National cyber deterrence and
the Irish Defence Forces’ contribution”
cybersecurity and resilience of key potential targets and working closely (thus expanding DoD
cyber cooperation) with other departments and agencies, industry and international partners.27
142
“National cyber deterrence and
the Irish Defence Forces’ contribution”
example.32 This framework is regarded as an important step in the development of signalling and
reactive capacities at EU and Member State level by increasing capacity to attribute to influence
the behaviour of potential aggressors and taking into account the need to ensure proportionate
responses.33 In terms of developing such national response frameworks, the State may need to
again consider the role of all-source intelligence that is sourced primarily from Irish agencies
when making decisions related to attribution to support the political legitimacy of its responses
vis-à-vis foreign actors, and to ensure that a sovereign political decision is made given that
attribution continues to be a sovereign political decision based on all-source intelligence. The
EU cyber strategy makes clear that such attribution is essential to bring perpetrators to justice,
warranting an urgent need to improve capacity to identify those responsible for cyber attacks.34
A topical discussion related to collective deterrence and response for consideration in the
Irish context is the viability of the cyber deterrence initiative of the United States which builds
upon the United States National Cyber Strategy’s proposal in 2018 that collective action by
a coalition of states will have a more powerful effect than the efforts of one state alone to
deter. This raises the question as to how Ireland should engage in group initiatives like the
United States’ cyber deterrence initiative. The State must ideally examine how these initiatives
align with its own interests to promote a peaceful and prosperous environment that is in line
with the country’s democratic values and security needs. By doing so, this means that the
State does not (or is not seen to) unwittingly become part of such a group alignment that
could be perceived in alienating terms where current descriptions such as a “coalition of the
willing” or “the like-minded” could possibly bring military and five-eyes intelligence alliance
images to mind. Instead, the State could likely join such a group initiative where it finds that
it has like-minded foreign policy and economic interests including mutual security, economic
and value interests, as well as understandable information sharing needs. Moreover, how the
EU will choose to engage on this matter may further support Irish needs. By communicating
these types of decisions carefully, the State could then continue to protect its international
reputation as an honest broker and a country open to business, further protecting its ability
to negotiate favourably in other non-cyber related international discussions. Furthermore, this
type of thinking and action by the State could be in line with Irish foreign policy to work with
like-minded partners as laid out in the 2015 “Global Island” paper, while also meeting other
concerns that might arise in relation to collective security and neutrality/non-alignment.
Further examples of the types of actions that could be taken as part of a framework for effective
deterrence can be identified within the EU’s current cyber strategy, which reflects more evolved
thinking on cyber since the Irish cyber strategy was first written. These include (1) Improving the
capacity to identify malicious actors; (2) Stepping up law enforcement response to cybercrime
through effective investigations and prosecutions, updating the procedural framework, and
adhering to the Budapest Convention; (3) Enhancing public private cooperation against
cybercrime; and (4) Focusing on Member States’ defence capability by promoting synergies
between military and civilian efforts given the dual-use nature of these technologies and tools.
A number of other states, such as the United Kingdom, The Netherlands, and Australia also
32 Council of the European Union, “Cyber-attacks: Council is now able to impose sanctions”, 17 May 2019, https://www.consilium.
europa.eu/en/press/press-releases/2019/05/17/cyber-attacks-council-is-now-able-to-impose-sanctions/?utm_source=dsms-auto&utm_
medium=email&utm_campaign=Cyber-attacks%3a+Council+is+now+able+to+impose+sanctions
33 European Commission and High Representative of the Union for Foreign Affairs and Security Policy Joint Communication to the European
Parliament and the Council, “Resilience, Deterrence and Defence: Building strong cybersecurity for the EU”, 13 July 2017, 16.
34 Ibid., 13.
143
“National cyber deterrence and
the Irish Defence Forces’ contribution”
emphasise that they have the means to take offensive action in cyberspace should they choose
to do so – in other words, the Irish national security community could examine whether the
ability to take offensive action by cyber and non-cyber means as part of a defensive posture is a
necessity for effective and credible cyber deterrence, including how this should be communicated
as part of an effective strategic communication framework given concerns about neutrality.
144
“National cyber deterrence and
the Irish Defence Forces’ contribution”
Ireland should therefore continue to leverage the reputation that the country is safe from
disproportionate surveillance while also deepening its reputation for being a safe place to do
business in relation to malevolent use of cyber capabilities.37
145
“National cyber deterrence and
the Irish Defence Forces’ contribution”
Conclusion
While the Irish government already encourages civil-military cooperation (including in the
event of a national cyber incident or emergency) and the Defence Forces are expected to
maintain a capability in the area of cybersecurity to protect its own networks and users, this
capacity more recently came under threat with the apparent standing down of the Defence
Forces’ internal cybersecurity unit in 2019. This recent development could hinder effective
civil-military cooperation if left unresolved, and it seems unclear that the Defence Forces could
then assist in the event of a serious cyber crisis or attack. It is further uncertain that the
Defence Forces could routinely and effectively defend its networks. In short, it is not clear
that the Irish state would be able to implement an effective, credible and dissuasive deterrence
framework without such a defence contribution based on these media reports.
To conclude, this situation is exacerbated at a time when advanced military strategic thinking
is needed for contemporary analyses of cyber deterrence in the wake of modern cyber threats
that are often persistent and below the threshold of conflict, as exemplified in most advanced
democratic states. Such strategic thinking is described in this article, whereby a number of
measures could be considered in the Irish context. These include, steps such as (1) Continuing
the Irish government’s ongoing work to enhance cyber resilience as part of deterrence by
denial where resilience is understood to be a key pillar of deterrence strategy; (2) Unpacking
and adapting military thinking on 21st Century risks for the Irish security ecosystem as part
of comprehensive civil-military approaches to conflict in cyberspace; (3) Protecting the Irish
Defence Forces’ workforce as a critical cyber asset; (4) Adapting EU frameworks at national
level for response to malicious cyber activities where the Irish government already considers the
EU as having taken a particularly comprehensive approach; (5) Continuing to protect Ireland’s
reputation vis-à-vis national surveillance when tackling cybersecurity issues; and (6) Increasing
the State’s international action and engagement with a possible role for defence diplomacy to
promote Irish government positions on international cyber stability frameworks.
146
PERSISTENT ENGAGEMENT AND
INFORMATION CAMPAIGNING
Steven Harland
Defence and Security Advisor
Dick Hemsley
Director, Vedette Consulting (Ireland) Limited
Persistent Engagement and Information Campaigning
Introduction
Our societies are changing fundamentally, becoming ever more complex and interconnected.
Ease of access to information and its enabling digital technologies is rapidly shifting the
balance of power from governments and formal organizations towards informal groups
and individuals. Access to near real-time information via digital channels provides fora to
the latter two to engage in activities previously reserved only to states and supranational
organisations. The all-pervasive nature of digitally-shared information makes it an
immensely powerful multi-dimensional agent of change, facilitating an unprecedented level
of connectedness across the globe. Given this context, we will argue that Western states and
supranational organisations are inextricably engaged in a non-discretionary contest in which
their core values are held at risk, and that Smart Power responses are needed in pursuit of
their legitimate interests. We contend that this has implications for current security policy
paradigms, which need to be adjusted to encompass Information Campaigning approaches
matched to the new and dynamic competitive space. Finally, we will argue that the core of
the advocated approach is directed at an Influence Nexus; that locus in an Information
Campaign design where strategic, operational and tactical-level activities will, together,
realise a set of mutually-reinforcing behavioural outcomes across selected target audiences.
A New Seam
The evolving character of contemporary strategic competition and armed conflict
increasingly encompasses complexity, instability, uncertainty, all-pervasive information
and rapid technological development. The emergent networked world is characterised by
diverse audiences that cannot be usefully categorised in conventional ways; these are no
longer passive, but are now themselves acting as influencers, opinion-formers and ‘news-
makers’.1 Issues of identity, trust and security2 in the virtual dimension now play out in a
wider political discourse about data privacy, inequalities and unfettered global enterprise.
These developments have ushered in a new seam of inter-state competition that challenges
states to align their strategic approaches to the structural realities of multiple information
environments.3 The distinction between conflict and peace is fast eroding, and adversaries
of the West, both state and non-state, increasingly threaten the stability of the extant
international order. There is a continuing competition among diverse state and non-state
actors, one conducted largely with non-military means, which involves subversion, political
agitation, sabotage, espionage and crime, and is mediated through and by cyberspace.
Hybrid Warfare, Asymmetric Warfare and Reflexive Control4 are all examples of how states
are already conducting such a contest in and via cyberspace to gain strategic advantage.5
1 Slaughter (2009) comments that the emerging networked world exists ‘above the state, below the state, and through the state’. A.M.
Slaughter, ‘America’s Edge: Power in the Networked Century’, Foreign Affairs, January/February, 2009. For mass self-communication see
M. Castells, Communication Power, Oxford University Press, 2009. For media ecology see J van Dijck, Culture of Connectivity: A Critical
History of Social Media, Oxford University Press, 2013, R. Grusin, Premediation: Affect and Mediality After 9/11, Basingstoke: Palgrave
Macmillan, 2010; J. Mackinlay, The Insurgent Archipelago, London: Hurst & Co, 2009
2 Edward Lucas, Cyberphobia: Identity, Trust, Security and the Internet, 2015.
3 R.J. Harknett, Cyber Persistence: Re-thinking Security and Seizing the Strategic Cyber Initiative, National Academies of Sciences,
Engineering, Medicine, Decadal Survey of Social & Behavioural Sciences for Applications to National Security, October 11, 2017; M.P.
Fischerkeller and R.J. Harknett , Deterrence is Not a Credible Strategy for Cyberspace, ORBIS, Vol 61, Issue 3, 2017, 381-393; R.J.
Harknett and E.O. Goldman, The Search for Cyber Fundamentals, Journal of Information Warfare, Volume 13, Issue 2, 2016. Harknett
suggests that complexity arises from the fact the terrain is both a ‘space’ and a ‘means’.
4 Reflexive control is defined as a means of conveying to a partner or an opponent specially prepared information to incline him to voluntarily
make the predetermined decision desired by the initiator of the action.
5 For commentary on Hybrid Warfare, see Galeotti, M, ‘Hybrid, Ambiguous, and Non-Linear? How New Is Russia’s “New Way of War”?’
Small Wars and Insurgencies, Vol. 27, No. 2, 2016, pp. 282–301; R. Seely, Defining Contemporary Russian Warfare: Beyond the Hybrid
Headline, RUSI Journal, Vol 162, No 1, February-March 2017. For Asymmetric Warfare, see R. Thornton, The Russian Military’s New ‘Main
Emphasis’: Asymmetric Warfare, RUSI Journal, Volume 162, No 4, Oct 2017; For Reflexive Control, see T.L. Thomas, Russia’s Reflexive
Control Theory and the Military, Journal of Slavic Military Studies, Vol. 17, No. 2, 2004, 237–56.
148
Persistent Engagement and Information Campaigning
States are now, essentially, persistently engaged at below the threshold of armed conflict.6
The effect of this on the present international order may be to dramatically reshape relations
between states, and between states and non-state actors, and bring a multitude of spatially
distant, previously objectively weak actors into the strategic mix.7 Some states have been
swift to recognise both the threat and opportunity these developments present, and have
adopted new long-term strategies as a result.
Russia and China have been characterised as executing Sharp Power strategies to ‘…penetrate,
or perforate, the political and information environments in the targeted countries…to
manipulate their target audiences by distorting the information that reaches them’.8 In so
doing, they are exerting pressure on their perceived adversaries using all four classical levers
of national power (Diplomatic, Informational, Economic and Military – DIME), without
regard to Western norms of behaviour. Via extensive multi-dimensional campaigns of
disinformation, Sharp Power users seek to amplify the tensions between audiences which
seem suspicious of authority and unwilling to await the rebuttal of unsupported opinions
by governmental actors.9 Attribution of activity to actor is often difficult, in cyberspace,
particularly in the social media environment, and so the scope for deception and denial
is immense.10 Actions by the West’s strategic competitors are not nearly so constrained by
legal and ethical considerations. New ‘rules of the game’ are emerging, and so Western
states must swiftly learn how to play well by them – without compromising their liberal
democratic values. However, Western actors’ notions of the nature and primacy of truth
appear to be stressed in these new circumstances, and so may distort their strategic
responses.11 Furthermore, Joseph Nye observes that the West should be cautious about
offensive responses to the growing Sharp Power threat. Whilst accepting the tactical utility
of information warfare, he warns the West against launching major programmes of covert
information warfare which, if compromised and correctly attributed, could undermine its
strategic efforts at exerting its Soft Power12.
Information Campaigning
Within this dynamic strategic context, bringing influence to bear on actors and audiences is
becoming more complex and competitive, and yet is increasingly central to the protection,
6 Referred to by Chief of the General Staff, Gen Sir Nicholas Carter at this Opening Address to the RUSI Land Warfare Conference, 28
June 2016.
7 Mackinlay, ibid. Cairncross talks about the ‘death of distance’. F. Cairncross, Death of Distance: How the Communications Revolution is
Changing Our Lives, Cambridge, MA: Harvard Business School Press, 2001.
8 C. Walker and J Ludwig, The Meaning of Sharp Power: How Authoritarian States Project Influence, Foreign Affairs, November 2017. C.
Walker, S. Kalathi and J. Ludwig, How Democracies Can Fight Authoritarian Sharp Power: New Laws Aren't Enough, Foreign Affairs, August
16, 2018. Wigell (2019) characterises this form of interference as a ‘wedge strategy’ that seeks to undermine governance. M. Wigell, Hybrid
interference as a wedge strategy: a theory of external interference in liberal democracy, International Affairs 95: 2 (2019) 255–275.
9 For example, S. Bradshaw and P.N. Howard, Challenging Truth and Trust: A Global Inventory of Organized Social Media Manipulation,
Oxford Internet Institute, Oxford University, 2018. P.N. Howard, B. Ganesh, D. Liotsiou, J. Kelly and C. Franciois, The IRA, Social Media
and Political Polarization in the United States, 2012-2018, Oxford Internet Institute, Oxford University, 2018. An assessment of the Internet
Research Agency’s U.S.-directed activities in 2015-2017 based on platform-provided data, Senate Select Committee on Intelligence
Research Summary, New Knowledge Report, December 2018.
10 In a ‘post-truth’ world, what does attribution achieve after the event when addressing social media manipulation, for example, Russia’s
Internet Research Agency (IRA) extended attacks on the United States using computational propaganda to misinform and polarize US
voters. See P.N. Howard, B. Ganesh, D. Liotsiou, J. Kelly and C. François, The IRA, Social Media and Political Polarization in the United
States, 2012-2018. Working Paper: UK Project on Computational Propaganda, Oxford Internet Institute, Oxford University, 2018.
11 K. Giles, Russia’s ‘New’ Tools for Confronting the West Continuity and Innovation in Moscow’s Exercise of Power, Royal Institute of
International Affairs, March 2016.
12 J.S. Nye Jnr, How Sharp Power Threatens Soft Power: The Right and Wrong Ways to Respond to Authoritarian Influence, Foreign Affairs,
2018. J.S. Nye Jnr, Soft Power: The Means to Success in World Politics, Public Affairs; New Ed edition, 2005.
149
Persistent Engagement and Information Campaigning
150
Persistent Engagement and Information Campaigning
a primary focus of Western security strategies. Smart Power can best be delivered through
Information Campaigning, which we define as: the operationalization of a defined Information-
led strategy via the exercise of ‘Smart Power’ in order to secure beneficial influence in pursuit
of national/supranational interests. Information Campaigning opens up a new channel for
strategic competition by seeking primacy in the contest of ideas and the battle to attract. Its
conduct therefore has profound implications for national and supranational security.
Protection and advancement of interests is at the heart of sound foreign and security policy-
making. Palmerston asserted that: ‘We have no eternal allies, and we have no perpetual
enemies. Our interests are eternal and perpetual, and those interests it is our duty to follow’18. It
follows that strategy-making should seek to promote and protect explicitly-identified interests,
encapsulated in policy which provides its ends. Only in, or on the very threshold of conflict,
should the West’s use of the military lever of power be predominant. In other circumstances,
the Diplomatic, Informational or Economic lever of DIME will be the supported one. When
a strategy has been chosen, it will be enacted via one or more campaigns, each of which will
be rooted in one of the levers of power. Given the centrality of the virtual dimension, the
Informational lever is now becoming predominant. As with military campaigning in the
physical domain, there may well be an ‘offensive premium’19 to be exploited in Information
Campaigning in the virtual one.
An Adaptive Approach
A liberal-democratic state can only undertake successful Information Campaigning by creating,
integrating and coherently developing a federation of capabilities which are typically owned and
separately exploited by different elements of the governmental enterprise. These governmental
capabilities include a set of ‘effectors’ responsible for: Diplomacy; Overseas Development Aid20;
International Trade Relations; Strategic Communication; Military Information Operations;
Active Cyber Operations and Secret Intelligence. They also include those capabilities
responsible for Homeland Security and Defensive Cyber Operations (as ‘protectors’), and
for the provision of Information Systems and Services and Science and Technology advice
(as ‘enablers’).
Credible and effective Information Campaigning requires that bespoke combinations of
these key instruments operate across multiple domains (cyberspace and the electromagnetic
spectrum, space, sea, land and air) as part of cross-government efforts, integrated with
those of allies and partners. This integrated approach must go much wider, and deeper,
than previous initiatives (such the EU’s ‘Comprehensive Approach’21 or the UK’s ‘Fusion
Doctrine’22). Furthermore, the challenge to state primacy is growing, as cyber and other
18 Henry Temple, 3rd Viscount Palmerston, British Foreign Secretary, speech in the House of Commons, 7th August 1844 (Hansard https://api.
parliament.uk/historic-hansard/commons/1844/aug/07/foreign-policy-of-ministers accessed on 31st July 2019).
19 For example, Dr Philip Sabin (The Counter Air Contest, in The Dynamics of Airpower, HMSO 1996) asserts that, given the nature of the
air environment, offensive action has an inherent advantage and therefore, in principle, is more likely to lead to success in what is termed the
‘counter-air contest’.
20 The sensitivities associated with the internationally agreed objectives of Overseas Development Aid are acknowledged, but these may
nonetheless align with security objectives more often – and more seamlessly – than might at first be thought.
21 Shared Vision, Common Action: A Stronger Europe. A Global Strategy for the European Union’s Foreign and Security Policy; European
Union, June 2016.
22 National Security Capability Review. Her Majesty’s Government, March 2018.
151
Persistent Engagement and Information Campaigning
information activities can be undertaken ever more easily by non-state actors. This changes
the risk calculus for states, as it blurs the distinction they typically make between ‘home’ and
‘away’ operating spaces. In the new era of persistent engagement, states require a broader range
of tools, and both attributable and non-attributable methods with which to apply effective
pressure on adversaries below the Western military response threshold. Synchronization of
disparate activities in domain, space and time is essential in order to realise intended influence
effects. A useful capacity for Information Campaigning therefore requires pan-governmental
enterprise alignment, laterally, vertically and temporally23:
Horizontal alignment: Across each relevant governmental agency and department, including
between functional teams, to optimise strategic alignment and co-ordination of activity.
Vertical alignment: Along multiple developmental pathways to cohere strategies with
operational planning and design activities to enable the delivery of full spectrum effects.
Temporal alignment: Through active monitoring and evaluation, over time, to understand
the realisation of effects, and objectives and the nature and level of risk.
Given the dynamic nature of their security challenges and continual developments in
digital technologies, Western governments need to be robustly adaptive – technologically,
organisationally and behaviourally – in approaching capability innovation in support of
Information Campaigning.
Influence Nexus
Western states are inextricably engaged in a non-discretionary contest, one in which their core
values and interests are held at risk. Individual and collective responses to their adversaries’
use of Sharp Power have tended to be reactive, and largely defensive in nature. We have argued
that a more effective response is to exert Smart Power in support of legitimate national or
supranational interests. In their current form and by their inherent nature, Western states and
their supranational organisations exert more Soft than Hard power. However, much of their
Soft Power remains latent at the seams between their governmental institutions. Furthermore,
in response to Sharp Power approaches such as those of Russia and China, their application of
a wholly Soft Power strategy risks overmatch.
Current Western security policy paradigms should be adjusted to accommodate active
Information Campaigning within today’s dynamic competitive space: engaging multiple
target audiences whilst constraining adversaries’ freedom of manoeuvre; and changing their
risk calculus by creating a set of complimentary deterrence and compellence effects. The core
of this approach lies in carefully planned and coherently managed activities directed at an
Influence Nexus across selected target audiences, including adversaries and other actors. The
Nexus is that point within an Information Campaign design when all strategic, operational
and tactical-level activities realise a set of mutually-reinforcing behavioural outcomes across all
chosen target audiences. To affect an Influence Nexus requires the continuous conduct of an
analytical process of mapping and characterising targets of interest, combined with the active
23 At a supranational (for example, EU or NATO) level, an additional dimension of complexity obviously applies, as supranational institutional
capabilities must be confederated with Member States’ own federations.
152
Persistent Engagement and Information Campaigning
monitoring and evaluation of the effects realised on them. Both these processes should drive,
and be intimately supported by, a dynamic and layered intelligence framework and architecture.
If states can acquire a capacity for effective Information Campaigning focused on an Influence
Nexus, they will gain the sophistication to use Smart Power to secure their societies without
compromising their core values.
153
154
MAPPING IRELAND’S ROLE
IN CYBER WARFARE AND
PEACEKEEPING:
Developing Policy Towards Situational
Awareness and Incident Response
Matthew G. O'Neill
Senator George J. Mitchell Institute for Global Peace, Security and Justice,Queen’s
University Belfast
Mark WIlliams
Senator George J. Mitchell Institute for Global Peace, Security and Justice,
Queen’s University Belfast
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
Introduction
This paper aims to explore how Ireland's Defence Forces and the Irish Department of
Foreign Affairs and Trade can leverage their extensive experience of peacekeeping within
conflict and post-conflict societies in the context of potential future cyber conflicts. Such
an exploration is set within the context of Ireland’s collaboration within the European
initiative, the Permanent Structured Cooperation (PESCO)1 and in a geo-political landscape
where cyber security threats are used as a form of diplomatic leverage.
Ireland has a strong and proud heritage of peacekeeping through the United Nations
with significant recent examples including activities in Liberia (2003), Chad (2007) and
Syria (2013). At present Ireland is involved in two major EU PESCO projects; Harbour and
Maritime Surveillance and Protection2 and the EU Training Mission Competence Centre3. Based
on its peacekeeping history and well-developed cyber sector, this research proposes Ireland
should play a leading role in the formation and development of cyber peacekeeping by also
seeking membership of the following PESCO mechanisms; the Cyber Threats and Incident
Response Information Sharing Platform4 and Cyber Rapid Response Teams and Mutual Assistance
in Cyber Security5.
As cyber warfare becomes more prevalent it is increasingly important for peacekeeping
missions to have a cyber element to fully reflect future challenges and contexts and to ensure
a full reconstruction of post-conflict societies. It could be built upon within the Department
of Foreign Affairs and Trade’s combined approach of developing a conflict resolution
function in order to export Ireland’s own model6, based around the 4 Ps: Prevention,
Participation, Protection and Promotion7.
This proposed diplomatic model could be leveraged for other states focused on peacekeeping
while reinforcing Ireland’s leadership within this field, focusing on new initial cyber
assessment for conflict and post-conflict societies and exploring how monitoring can
contribute towards peace by identifying actions that violate ceasefire agreements, human
rights abuses and network infractions.
This model could also develop ‘new multinational strategies and institutions’ to ensure the
‘sovereignty and survival of states’8 by assessing the level of aid resources needed and the
capacity of the local IT sector to act.
1 European Deference Agency, The Permanent Structured Cooperation, [Accessed on 25.07.2019] https://www.eda.europa.eu/what-we-
do/our-current-priorities/permanent-structured-cooperation
2 PESCO Projects, Harbour and Maritime Surveillance and Protection (Harmspro), [Accessed on 25.07.2019] https://pesco.europa.eu/
project/harbour-and-maritime-surveillance-and-protection/
3 PESCO Projects, European Union Training Mission Competence Centre (EU TMCC), [Accessed on 25.07.2019] https://pesco.europa.
eu/project/european-union-training-mission-competence-centre/
4 PESCO Projects, Cyber Threats and Incident Response Information Sharing Platform, [Accessed on 25.07.2019] https://pesco.europa.
eu/project/cyber-threats-and-incident-response-information-sharing-platform/
5 PESCO Projects, Cyber Rapid Response Teams and Mutual Assistance in Cyber Security, [Accessed on 25. 07. 2019] https://pesco.
europa.eu/project/cyber-rapid-response-teams-and-mutual-assistance-in-cyber-security/
6 William A. Hazleton, ‘Look at Northern Ireland’: Lessons Best Learned at Home. In Lessons from the Northern Ireland Peace Process, The
University of Wisconsin Press, 2013, 34 - 60
7 Department of Foreign Affairs and Trade, Speech by Tánaiste at launch of Ireland’s Third National Action Plan on Women, Peace and
Security, 21 June 2019 [Accessed on 25.07.2019] https://www.dfa.ie/news-and-media/speeches/speeches-archive/2019/june/speech-by-
tanaiste-at-launch-of-irelands-third-national-action-plan-on--women-peace-and-security.php
8 Stephen Herzog, Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses, In Journal of Strategic
Security Vol. 4, No. 2, Strategic Security in the Cyber Age (Summer 2011), 49-60. [Accessed on 25.07.2019] https://www.jstor.org/
stable/26463926?seq=10#metadata_info_tab_contents
156
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
9 Thomas Rid, Cyber war will not take place. Journal of strategic studies, 2012, 35(1), 5-32.
10 The International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the
International Law Applicable to Cyber Warfare, Cambridge University Press
11 Ziyad Hayatli, Cyber Warfare in International Law, The New Jurist, 6 December 2018, [Accessed on 25.07.2019] http://newjurist.com/cyber-
warfare-in-international-law.html
12 Ibid
13 Ibid
14 Ibid
15 Steve Ranger, Cyber war isn’t turning out quite how it was expected, In ZD Net, 18 July 2016 [Accessed on 25.07.2019] https://www.zdnet.
com/article/cyber-war-isnt-turning-out-quite-how-it-was-expected/
16 Emilio Iasiello, Cyber Strikes Do Not Equate to Cyber Warfare, In Technative, 10 July 2019 [Accessed on 25.07.2019] https://www.
technative.io/cyber-strikes-do-not-equate-to-cyber-warfare/
17 Steve Ranger, What is cyberwar? Everything you need to know about the frightening future of digital conflict, In ZD Net, 4 December 2018
[Accessed on 25.07.2019] https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/
18 North Atlantic Treaty Organization, Cyber Defence, NATO, 16. July.2018 [Accessed on 25.07.2019] https://www.nato.int/cps/en/natohq/
topics_78170.htm
19 Stephen Herzog, Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses, In Journal of Strategic Security
Vol. 4, No. 2, Strategic Security in the Cyber Age (Summer 2011), PP.49-60. [Accessed on 25.07.2019] https://www.jstor.org/
stable/26463926?seq=10#metadata_info_tab_contents
157
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
While attribution was never fully confirmed in those two attacks, since states increasingly
find it easier to cover their tracks than do individuals involved in cyber offensives, it is
nevertheless possible based on the geopolitical situation to speculate on which aggressors might
be responsible20.
NATO’s recognition in July 2016 that cyberspace constituted a theatre of war/domain of
operations alongside air, land and sea, and the possibility that a cyber attack on a member state
if severe enough could trigger an Article 5 response, illustrates the increased reliance on digital
systems to operate and maintain most nations’ infrastructures and highlights the potential
harm a cyber attack could inflict on both an individual national ecosystem as well as the
global economy2122.
The International Strategy for Cyberspace outlined by President Obama in May 2011, further
underlined this point by stating that “all necessary means” including military operations
would be used to counter “hostile acts conducted through cyberspace”23. This move towards
a blended warfare model in which a digital attack can be met with a kinetic response was
recently illustrated by Israel’s attack on Hamas (June 2019)24 in response to a cyber attack and
the mobilisation of the US Air Force in response to the Iranian downing of a US surveillance
drone (July 2019)25.
These two events should not be seen as trivial or unique and the potential for future conflict
to be triggered by a digital attack cannot be downplayed. As the UN Secretary General,
Antonio Guterres, recently noted: “I am absolutely convinced that, differently from the
great battles of the past, which opened with a barrage of artillery or aerial bombardment,
the next war will begin with a massive cyber attack to destroy military capacity... and paralyse
basic infrastructure...” (2018)26.
While the full impact of cyber warfare is not yet fully appreciated, what is known is that cyber
related interventions will be needed to restore peace and security and assist the recovery and
rebuilding of nation states in both the physical and digital realms (Dorn, 2017)27. Peacekeeping,
therefore, will increasingly require a cyber element and Ireland can be well-placed to offer
this expertise28 29.
20 Emilio Iasiello, Cyber Strikes Do Not Equate to Cyber Warfare, In Technative, 10 July 2019 [Accessed on 25.07.2019] https://www.
technative.io/cyber-strikes-do-not-equate-to-cyber-warfare/
21 North Atlantic Treaty Organization, Cyber Defence, NATO, 16. July.2018 [Accessed on 25.07.2019] https://www.nato.int/cps/en/natohq/
topics_78170.htm
22 Press Release, Exposure to cyber-attacks in the EU remains high – New ENISA Threat Landscape report analyses the latest cyber threats,
European Union Agency For Cybersecurity 28 January 2019 [Accessed on 25.07.2019] https://www.enisa.europa.eu/news/enisa-news/
exposure-to-cyber-attacks-in-the-eu-remains-high
23 John M. Donnelly, National security experts say America is woefully unprepared for cyber warfare, In Security Infowatch, 15 July 2019
[Accessed on 25.07.2019] https://www.securityinfowatch.com/cybersecurity/news/21088486/national-security-experts-say-america-is-
woefully-unprepared-for-cyber-warfare
24 Lily Hay Newman, What Israel’s Strike on Hamas Hackers Means For Cyberwar, 05 April.2019 [Accessed on25.07.2019] https://www.wired.
com/story/israel-hamas-cyberattack-air-strike-cyberwar/
25 Scott Shane, Nicole Perlroth and David E. Sanger, ‘Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core. In The New York
Times, 12.November, 2017 [Accessed on 25.07.2019] https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html
26 Report, ENISA Threat Landscape Report 2018: 15 Top Cyberthreats and Trends, January 2019, [Accessed on 25.07.2019] https://www.
enisa.europa.eu/publications/enisa-threat-landscape-report-2018
27 Walter Dorn, Cyberpeacekeeping: A New Role for the United Nations. In Georgetown Journal of International Affairs, 18, Issue 3 (Fall 2017).
[Accessed on 25.07.2019] https://heinonline.org/HOL/Page?handle=hein.journals/geojaf18&div=54&?&collection=journals
28 Aleksandar Shopski, Cyber Peacekeeping Forces: the solution to a contemporary matter, In Techruption, May 2018, [Accessed on
25.07.2019] https://www.techruption.org/cyber-peacekeeping-forces-the-solution-to-a-contemporary-matter/
29 Helge Janicke, Cyber peacekeeping is integral in an era of cyberwar – here’s why, In The Conversation, 29 January 2019, [Accessed
on25.07.2019] https://theconversation.com/cyber-peacekeeping-is-integral-in-an-era-of-cyberwar-heres-why-90646
158
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
30 Alex Barker and Mehreen Khan, What to expect from President von der Leyen, 17 July 2019, [Accessed on 25.07.2019] https://www.ft.com/
content/f15b3e28-a818-11e9-984c-fac8325aaa04
31 Mette Eilstrup-Sangiovanni, Why the World Needs an International Cyberwar Convention, In Philosophy and Technology, September 2018,
Vol 31, Issue 3, 379-407.
32 Council on Foreign Relations, Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms, 23 February 2018,
[Accessed on 25.07.2019] https://www.cfr.org/report/increasing-international-cooperation-cybersecurity-and-adapting-cyber-norms
33 European Union External Action, Towards a stronger EU on security and defence, 19 November 2018, [Accessed on 25.07.2019] https://
eeas.europa.eu/headquarters/headQuarters-homepage/35285/towards-stronger-eu-security-and-defence_en
34 Zak Doffman, Cyber Warfare Threat Rises As Iran and China Agree ‘United Front’ Against U.S., In Forbes, 6 July 2019 [Accessed on
25.07.2019] https://www.forbes.com/sites/zakdoffman/2019/07/06/iranian-cyber-threat-heightened-by-chinas-support-for-its-cyber-war-on-
u-s/
35 Political and Security Committee, CFSP Report – Our priorities in 2017, [Accessed on 25.07.2019] https://eeas.europa.eu/sites/eeas/files/
st10650_en-cfsp_report_2017.pdf
36 EU Competency Framework, EU Competency Framework for the management and implementation of the European Regional Development
Fund and the Cohesion Fund, [Accessed on 25.07.2019]
37 Anri Van der Spuy, What if we all governed the Internet? Advancing multi-stakeholder participation in Internet governance, 2017, [Accessed
on] https://unesdoc.unesco.org/ark:/48223/pf0000259717_eng
38 European Commission, Questions and Answers – EU Cybersecurity, 26 June 209, [Accessed on 25.07.2019] http://europa.eu/rapid/press-
release_QANDA-19-3369_en.htm
159
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
to employ here, as within this concept Europe has become a laboratory of different security
practices, with cybersecurity no different39.
The current EU approach to designing cybersecurity policy has been one of a purely technical
nature or ‘logic of control’40. As this paper outlines, because cybersecurity will be used as a
form of diplomacy in coming decades it is vital that governments have policy and procedures
to enact in case they are in areas or conflict zones that have been affected by a diplomatic cyber
attack41.
The EU’s role on the international stage will be brought to the fore when institutions need
to be protected. With PESCO and the different strands of policy development under the new
commission it is clear that cybersecurity and cyber defence will be a key pillar for the EU to
become a ‘normative global actor’. This of course depends on whether the issues addressed in
this paper are resolved, and the EU could fully enact its potential to be a leading actor42.
A significant question within this context will be whether the EU will still be committed to an
open and free internet and making sure its citizens rights are not diminished. Within the EU,
individual members remain dominant in cybersecurity; and while Ireland still has a lot it can
learn from its neighbours, it is clear that within the emerging cybersecurity approach it has a
lot of experience to offer in how cyber warfare can affect conflict and post-conflict assistance
on the ground43.
The EU has an opportunity to be more than only a coordinator and facilitator of policies. It
could become a powerful cybersecurity actor in its own right and it is important that Ireland’s
voice is heard in this context, as it continues to support and consider its roles and responsibilities
within PESCO. The question is, will member states be able to produce an attributable response
to these pressing issues. The Defence Forces has had a distinguished history both of providing
peacekeeping missions on the ground and balancing practical diplomacy. Where it has not
yet been given the attention it rightly deserves is in the area of cyber peacekeeping within the
digital and real worlds44.
Currently small EU member states such as Belgium and Portugal are bringing together its
private, public and higher education sectors to lead on cyber defence projects under the
auspices of PESCO. Ireland could adopt a similar strategy to utilises the expertise of research
and development being carried out in Irish higher education institutions and in the private
sector to develop its cyber peacekeeping capabilities, as at present the Defence Forces currently
have minimal cyber capability.
39 European Defence Matters, PESCO: More Than Just Projects, 2019 [Accessed on 25.07.2019] https://www.eda.europa.eu/webzine/
issue15/cover-story/pesco-more-than-just-projects
40 European Union External Action, New tool to address cyber threats: the EU’s Rapid Response Force, 27.06.2018 [Accessed on 25.07.2019]
https://eeas.europa.eu/topics/eu-international-cyberspace-policy/47525/new-tool-address-cyber-threats-eus-rapid-response-force_en
41 The European Files, Guaranteeing Cybersecurity: Ambitions for a European Cyberspace, March 2019, No 57, [Accessed on 25.07.2019]
https://aioti.eu/wp-content/uploads/2019/03/Guaranteeing-Cybersecurity-Ambitions-European-Cyberspace-issue-57.pdf
42 Nathalie Tocci, Who is a Normative Foreign Policy Actor? The European Union and Its Global Partners, CEPS, 27 May 2008, [Accessed on
25.07.2019] https://www.ceps.eu/ceps-publications/who-normative-foreign-policy-actor-european-union-and-its-global-partners/
43 Department for Digital, Culture, Media and Sport, Cyber Security Breaches Survey 2019, [Accessed on 25.07. 2019] https://assets.
publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_
Report.pdf
44 Council of the European Union, Cyber defence: Council updates policy framework, 19 November 2018, [Accessed on 25.07.2019] https://
www.consilium.europa.eu/en/press/press-releases/2018/11/19/cyber-defence-council-updates-policy-framework/
160
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
45 Robinson, M., Jones, K., Janicke, H. and Maglaras, L., 2018. An introduction to cyber peacekeeping. Journal of Network and Computer
Applications, 114, 70-87.
46 Ibid.,70-87.
47 Press Release, ‘Colombia Peace Agreement’ Department of Foreign Affairs and Trade, 2016 [Accessed on 25.07.2019], https://www.dfa.ie/
annualreport/2016/our-influence/colombia-peace-agreement/
48 Adriaan Alsema, Intelligence unit to fight ‘fake news’ and cyber-attacks in Colombia’s elections, Colombia Reports, 23 January 2018,
[Accessed on 25.07.2019] https://colombiareports.com/intelligence-unit-fight-fake-news-cyber-attacks-colombias-elections/
49 Ibid.
50 Ted Piccone, Is Colombia’s fragile peace breaking apart?, Brookings Institute, 28 March 2019, [Accessed on 25.07.2019] https://www.
brookings.edu/blog/order-from-chaos/2019/03/28/is-colombias-fragile-peace-breaking-apart/
51 Robinson, M., Jones, K., Janicke, H. and Maglaras, L., 2018. An introduction to cyber peacekeeping. Journal of Network and Computer
Applications, 114, 70-87.
161
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
Figure 1: compiled using the Tallinn Manual on the International Law Applicable to Cyber Warfare; NATO’s Cyber
Defence Principles; and Department of Foreign Affairs and Trade Strategy 2017-2020
As Robinson, Jones, and Janicke note, current UN peacekeeping doctrines will need to be
altered to apply to conflicts involving digital elements. To quote, "Organizations such as the
UN will find it an increasing necessity to operate in cyberspace in order to maintain peace."56
How can this be achieved and what role could Ireland play? Any cyber peacekeeping activity
will need to observe and respond to potential violations of ceasefire agreements and ensure
incidents are responded to.
52 Department of Foreign Affairs and Trade, Statement of Strategy 2017-2020, [Accessed on 25.07.2019] https://www.dfa.ie/media/dfa/
alldfawebsitemedia/aboutus/DFAT-Statement-of-Strategy-2017-2020.pdf
53 The International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual on the
International Law Applicable to Cyber Warfare, Cambridge University Press
54 North Atlantic Treaty Organization, Cyber Defence, NATO, 16. July.2018 [Accessed on 25.07.2019] https://www.nato.int/cps/en/natohq/
topics_78170.htm
55 Department of Foreign Affairs and Trade, Statement of Strategy 2017-2020, [Accessed on 25.07.2019] https://www.dfa.ie/media/dfa/
alldfawebsitemedia/aboutus/DFAT-Statement-of-Strategy-2017-2020.pdf
56 Robinson, M., Jones, K., Janicke, H. and Maglaras, L., Op Cit, 70-87.
162
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
This task not only reflects observation, monitoring and reporting activities currently carried
out by UN Peacekeepers but also the work carried out domestically by the National Cyber
Security Centre (NCSC)57. The NCSC could gain international recognition and be utilised to
undertake work securing systems and responding to incidents within an EU/UN context by
becoming a global centre of excellence that ensures the validation and continued verification
of ceasefire agreements in societies affected by cyberwarfare58 59.
Working with domestic and international partners, Ireland could ensure that risks to the
digital infrastructure of post-conflict societies are recorded and mitigated appropriately60. As
Robinson, Jones, and Janicke posit, this activity could be extended to include monitoring the
cessation of cyber attacks, maintaining a register of compromised systems, known vulnerabilities
and attacks and assisting with the reestablishment of critical systems and the dismantling of
botnets, malware etc.
Robinson, Jones, and Janicke also suggest that this activity is akin to the UN policies of
creating buffer zones and Disarmament, Demobilisation and Reintegration, in which cyber
peacekeepers improve cybersecurity in areas under their control by rendering systems safe
through the dismantling of malware and holding attackers to account61. At present there is no
mechanism to gain access to international and national IT systems for these purposes.
Furthermore, Robinson, Jones and Janicke suggest that the United Nations could fund and
develop a framework in which service providers could be approached to aid in the attribution
of cyber attacks (Robinson et al, 2018). For example, this would be similar to how Interpol
currently assists member states efforts by coordinating and delivering specialised policing
services to ensure that transnational cybercrimes are combatted62.
This allows a society afflicted by digital conflict to be reintegrated into peacetime activities and
the wider global ecosystem. As such, future peacekeepers should not only improve cybersecurity
in a given area but also ensure that local capacity is developed to maintain cyber peace once
peacekeepers have left 63 64.
Ireland could be a leading voice within the EU and PESCO framework on how cyber
peacekeeping will be needed within the new era of blended warfare and how societies can
be restored following such conflict. Ireland can work towards this through its international
links and domestic institutions, while the EU should be at the heart of its development and
implementation.
The Irish Government and Defence Forces should consider being a part of the Cyber Threats
and Incident Response Information Sharing Platform and Cyber Rapid Response Teams and Mutual
Assistance in Cyber Security. A new resolution adopted by the EU parliament on 12 March 2019
57 Mission Statement, ‘National Cyber Security Centre’, Department of Communications, Climate Action and Environment, 2019 [Accessed
on 25.07.2019] https://www.dccae.gov.ie/en-ie/communications/topics/Internet-Policy/cyber-security/national-cyber-security-centre/Pages/
National-Cyber-Security-Centre.aspx
58 Ibid.
59 Robinson, M., Jones, K., Janicke, H. and Maglaras, L., Op Cit,.70-87..
60 Steve Ranger, What is cyberwar? Everything you need to know about the frightening future of digital conflict, In ZD Net, 4 December 2018
[Accessed on 25.07.2019] https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/
61 Robinson, M., Jones, K., Janicke, H. and Maglaras, L.,Op Cit, 70-87.
62 Interpol, Our Cyber Operations, https://www.interpol.int/en/Crimes/Cybercrime/Our-cyber-operations [Accessed on 25.07.2019]
63 TechRepublic, Cyberwar and the future of cybersecurity TechRepublic, 2018 [Accessed on 25.07.2019] https://www.techrepublic.com/
resource-library/whitepapers/special-report-cyberwar-and-the-future-of-cybersecurity-free-ebook/
64 Robinson, M., Jones, K., Janicke, H. and Maglaras, L., Op Cit, 70-87.
163
Mapping Ireland’s Role in Cyber Warfare and Peacekeeping:
Developing Policy Towards Situational Awareness and Incident Response
on building EU capacity on conflict prevention and mediation (2018/2159(INI)) has not included the
threat cyber security issues present and potentially damage the preservation of peace65.
Conclusion
Based on the arguments in this paper it is vital that an EU state institution should be taking
the lead.
Furthermore, this paper posits that Ireland is in a prime position to fulfil this role based on
its experience of UN peacekeeping, its domestic digital infrastructure and its developing role
within PESCO. Based on EU requirements grounded on its foreign policy relating to conflict
and post-conflict societies, it will be vital in a world created by technology, that responses to
technological events will be required to also preserve the physical world and the societies which
will need diplomatic and military assistance.
The National Cyber Security Centre’s Computer Security Incident Response Team stated
as part of its mission to “seek international recognition... in the respective government and
national CSIRT communities so that it can effectively undertake its work on situational
awareness and incident response’. Ireland can achieve this aim because it has the mechanisms
and expertise to utilize both strategies together to realise a vision for aiding other nations who
have been through a period of cyber conflict.
This paper has proposed a concept of how this approach and international institutions can
work together. It seeks to instigate a timely discourse on cyber peacekeeping and the role
smaller nations can play. Such an approach should be integrated into The Irish Defence Force,
National Cyber Security Centre and the Department of Foreign Affairs and Trade working group on
Ireland's post-conflict Model.
There are clear potential benefits including transparency, ease of collaboration, information
sharing and the potential for states to contribute their cyber expertise – and experts – without
diminishing their capability at home.
65 European Parliament, European Parliament resolution of 12 March 2019 on building EU capacity on conflict prevention and mediation
(2018/2159(INI)), [Accessed on 25.07.2019] http://www.europarl.europa.eu/doceo/document/TA-8-2019-0158_EN.html
164
ACHIEVING “INFORMATION
SUPERIORITY” OF THE
MARITIME DOMAIN IN THE
NETWORK AGE.
Lt (NS) Steven Ryan
Security and Defence Editor, EU Institute for Security Studies
Achieving “Information Superiority” of the maritime domain in the network age.
Abstract
Naval warfare is platform centric and the 22nd century Naval Service (NS) will increasingly
rely on information and communications technology (ICT) to enable these platforms to
achieve mission success. Leveraging technology to enhance capabilities at sea and
ashore will allow this to be conducted more efficiently. The NS use of the Sitaware suite
to achieve sensor feed integration, ship-shore connectivity, and decision support, is a
small scale example of the concept of network-centric warfare (NCW) in the Defence
Forces.
Introduction
Exploiting the advances in technology over time and integrating them into a C4ISR system
will allow the NS to gain full situational awareness across domains, and achieve “information
superiority” over an opponent, whether they are state or non-state actors. Ship launched
remotely piloted aircraft systems (RPAS) will wirelessly feedback video data to operators in a
VR environment, acquire targets and enable over-the-horizon engagements, while supporting
command decisions. Copernicus satellites currently produce visual imagery and synthetic
aperture radar returns of the sea surface with access times dependent on priority. Indigenously
developed Cubesats with AIS and radar signal detection software will directly feed NS
operations and allow the NS to call upon near real time satellite data, fed through correlation
software, and then into Sitaware. Vessel wake analysis programmes will determine course and
speed of vessels who do not correlate to AIS/VMS tracks allowing NS operations to direct
interception assets.
The future NS platform will require significantly increased bandwidth to rely on the integrated
communications infrastructure and multi-sensor data fusion necessary to achieve and maintain
this “information superiority”. Maintaining this network access will involve developing defensive
capabilities in the cyber and electromagnetic domains with the resulting requirement for the
seagoing warfighter to be both sailor and network manager, necessitating the remodelling of
the Irish professional military education system.
166
Achieving “Information Superiority” of the maritime domain in the network age.
square kilometres, a significant area to be managed 1. With a nine ship fleet and maintenance
and crewing requirements limiting the number of operational sea days per ship per annum,
it is vital for the NS to gain every advantage from technology to enforce jurisdictional control
of the Irish EEZ and maintain maritime situational awareness. This shift is ongoing with
the increasing use of a C4ISR suite, Symantec Sitaware, and the employment of remotely
piloted aircraft systems (RPAS) in overseas operations to expand the NS ability to conduct
maritime surveillance.
167
Achieving “Information Superiority” of the maritime domain in the network age.
7 Carlos Santamaria et al., “Mass Processing of Sentinel-1 Images for Maritime Surveillance,” Remote Sensing 9, no. 7 (July 2, 2017): 678,
https://doi.org/10.3390/rs9070678.
8 Nina Louisa Remuss, “Space and Maritime Security-Strategies for Countering the Pirates,” Space Policy 26, no. 2 (2010): 124–25.
9 Iraklis Oikonomou, “‘All u Need Is Space’: Popularizing EU Space Policy,” Space Policy 41 (2017): 5–11.
10 UCD, “EIRSAT-1,” 2018, https://www.eirsat1.ie/.
11 Basil Germond and Celine Germond-Duret, “Ocean Governance and Maritime Security in a Placeful Environment: The Case of the European
Union,” Marine Policy 66 (2016): 124–31.this article proposes that ocean governance and maritime security have translated into states' and
regional organisations' increasing control over maritime spaces. This leads to a certain territorialisation of the sea, not so much from a sovereignty
and jurisdictional perspective but from a functional and normative perspective. The article starts by discussing the ways oceans have been
represented and shows that they are far from a placeless void, both in practice and in discourse. The article then frames the analysis of ocean
governance and maritime security within critical geopolitics, and elaborates on the case of the European Union's narrative and practice. It
concludes on the mutually reinforcing link between discourse and practice in the field of ocean governance and maritime security in general, and
on the consequences for the EU in particular. Scholars working on ocean governance and maritime security are encouraged to challenge the
traditional view that oceans are placeless.
168
Achieving “Information Superiority” of the maritime domain in the network age.
vital confidence and certainty to the available information12. The technology to determine
ship heading and speed has been tested13 and the ability to discern vessels against backgrounds
is constantly improving14. This continuous development in satellite technology and quality is
matched by improvements in the ground based segment of the system where the analysis takes
place. Recent tests have shown a dramatic increase in the turnaround time of this information;
that is the time from the satellite taking an image to it being sent to the ground station,
analysed and interpreted, and then sent to an end user, be they military or other state agency
15
. Due to the large distances involved and the limited speed of vessels, the data need not be
available instantaneously, however, the sooner it is available, the better it can contribute to the
decision making process. The more quickly this information is made available to the end user,
the more valuable it is.
As an example, Norway is already developing and launching indigenous AIS detection and radar
detection satellites for its NorSat constellation, a geostationary maritime surveillance network
for monitoring its EEZ16. By including navigational radar which, in addition to AIS, is required
by international law, the ability to hide or falsify a vessel position will be greatly reduced, and
NorSat can help verify that ships in traffic meet those regulations. In the future Irish maritime
environment, indigenously developed Cubesats with AIS and radar signal detection software
will directly feed NS operations and allow the NS to call upon near real time satellite data, fed
through correlation software, and then into Sitaware. Vessel wake analysis programmes will
determine course and speed of vessels who do not correlate to AIS/VMS tracks allowing NS
operations to direct interception assets.
12 BOSILCA Ruxandra-Laura, “The Use of Satellite Technologies for Maritime Surveillance: An Overview of EU Initiatives,” Incas Bulletin 8, no.
1 (2016): 151–61.
13 Maria Daniela Graziano, Marco D’Errico, and Giancarlo Rufino, “Ship Heading and Velocity Analysis by Wake Detection in SAR Images,” Acta
Astronautica 128 (2016): 72–82.
14 Haibo Wang et al., “Detecting Ship Targets in Spaceborne Infrared Image Based on Modeling Radiation Anomalies,” Infrared Physics and
Technology 85 (2017): 141–46.
15 Kanjir, Greidanus, and Oštir, “Vessel Detection and Classification from Spaceborne Optical Images: A Literature Survey.”the number of
studies based on optical satellite data is quickly growing. Altogether we analysed 119 papers on optical vessel detection and classification for
the period from 1978 to March 2017. We start by introducing all the existing sensor systems for vessel detection, but subsequently focus only
on optical imaging satellites. The article demonstrates the temporal development of optical satellite characteristics and connects this to the
number and frequency of publications on vessel detection. After presenting the methods used for optical imagery-based vessel detection and
classification in detail, along with the achieved detection accuracies, we also report possibilities for fusing optical data with other data sources.
The studied papers show that the most common factors greatly influencing the vessel detection accuracy are the following: different weather
conditions affecting sea surface characteristics, the quantity of clouds and haze, solar angle, and imaging sensor characteristics. All these factors
bring great variations in the selection of the most suitable method; some still continue to pose unsolved challenges. For higher relevance and
wider usage, we suggest that the algorithms for detection and classification should support a variety of targets and meteorological conditions,
and ideally also a variety of optical satellite sensors. At least, they should be tested on many images under different conditions. This is not usually
the case in the existent literature. We also observed that many authors omit an appropriate performance quantification, which is critical for a
practical assessment and a numerical comparison of the presented algorithms. Overall it can be seen that vessel monitoring from spaceborne
optical images is a popular research topic and has a great operational potential in the near future due to the large amount of satellite data, much
of it free and open.
16 Norsk Romsenter, “Norway’s Satellites - Norsk Romsenter,” Norwegian Space Agency, 2018, https://www.romsenter.no/eng/Norway-in-
Space/Norway-s-Satellites.
17 Paul T Mitchell, “Small Navies and Network-Centric Warfare: Is There a Role?,” Naval War College Review 56, no. 2 (2003): 83–99.
169
Achieving “Information Superiority” of the maritime domain in the network age.
target information and tracking both within the Defence Forces and with foreign military
partners. Information sharing is the backbone of modern military cooperation18.
Future Challenges
The future NS platform will require significantly increased bandwidth to rely on the integrated
communications infrastructure and multi-sensor data fusion necessary to achieve and maintain
this “information superiority”. Cybersecurity and cyber defence will be a major tenet of future
naval operations, as once the link to other units or information sharing platforms such as a
C4ISR system is cut, the ability to conduct NCW and maintain a full spectrum operational
picture dissipates22. A dedicated cyber division on board ships will be required to maintain
this network access and will be involved in the development and deployment of defensive
capabilities in the cyber and electromagnetic domains with the resulting requirement for the
seagoing warfighter to be both sailor and network manager, necessitating the remodelling of
the Irish Naval Service professional military education (PME) system. In order to maximise
the advantages granted by technological solutions, a commitment to upgrade both hardware
and software is required. The capital cost of this is one of the barriers to maintaining NCW
capability in small navy. In order for the NS to operate in a NCW environment and utilise
available technologies, a considerable investment in training will be required at all ranks, from
operator to maintainer level. This will require modifying the training environment, with the
use of augmented or virtual reality settings to facilitate training while allowing ships to remain
at sea.
18 Stephanie Hszieh et al., “Networking the Global Maritime Partnership,” Naval War College Review 65, no. 2 (2012): 10–29.
19 Robert C Rubel, “Mission Command in a Future Naval Combat Environment,” Naval War College Review 71, no. 2 (2018): 109–21.
20 Patrick M Stillman, “Small Navies Do Have A Place in Network-Centric Warfare,” Naval War College Review 57, no. 1 (2004): 95–101.
21 “Upgrade of Maritime Surveillance | PESCO,” accessed June 30, 2019, https://pesco.europa.eu/project/upgrade-of-maritime-surveillance/.
22 Peter Dombrowski and Chris C. Demchak, “Cyber War, Cybered Conflict, and The Maritime Domain,” Naval War College Review 67, no. 2
(2014): 70–96.
170
Achieving “Information Superiority” of the maritime domain in the network age.
Conclusion
The future NS structure will have to adapt to and exploit the increasing tactical and operational
advantages that technology provides, while developing doctrine to ensure effect use of these
systems across multiple domains. Due to the ever changing nature of NCW and fast-paced
technological developments, a robust research and development organisation will be required
to bridge the gap from trial to full implementation in the NS. The integration of these concepts
at the earliest stage of training and platform development, supported at all levels, will be crucial
in the ability to attain and maintain information superiority over an adversity.
171
172
THE DEFENCE FORCES AND
FUTURE PEACE SUPPORT
OPERATIONS
Lt Col Timothy O’Brien
OIC Planning and Capabilities Section, D Ops
The Defence Forces and Future Peace Support Operations.
Abstract
Although the grandparents of Defence Forces personnel who will serve on 22nd Century
Peace Support Operations (PSO) have yet to be born it is arguable that attempting to
predict future PSO challenges is worthwhile. Predicting the future is of course impossible
but perhaps the best way to proceed is by analysing current PSO challenges.
The Defence Forces 60-year PSO journey has taken us from the traditional peacekeeping
operations of the Cold War, through the regional peace enforcement operations of the
1990s, to today’s multidimensional crisis management operations. While the bulk of
our peacekeepers remain infantry, our response to PSO has evolved from only sending
infantry units abroad during the Cold War, to dealing with the challenges of the 1990s
onwards by using a combination of transport, military police, naval, special forces and
medical units, complemented by today’s training teams, experts in consular security
and on island stand by forces. Future PSO may see the Defence Forces having to
conduct counter insurgency operations in Africa, deal with the effects of migration and
climate change on the EU’s southern borders and assist Irish citizens worldwide on Non-
combatant Evacuation Operations.
An innovative use of our limited resources and budgets will be essential and this may, for
example, see the RDF being used to enhance our limited language capabilities and to
increase the number of female personnel we deploy, or the Naval Service and Air Corps
only procuring vessels and aircraft that can conduct joint PSO operations with the Army
and Army Ranger Wing. Members of the artillery corps currently use UAV technology on
PSO in the Democratic Republic of the Congo and this is a prime example of how in the
future we will have to turn to technology to enhance our effectiveness on PSO.
Introduction
“The future security environment cannot be predicted with certainty.”1
On 24 June 2018 the Irish state marked the 60th anniversary of Defence Forces’ participation
in United Nations (UN) led or mandated Peace Support Operations (PSO) with a ceremony
in Dublin Castle attended by President Michael D. Higgins. In his address to veteran and
serving peacekeepers, President Higgins highlighted how over six decades nearly 66,700
individual members of the Defence Forces had served in peace support missions in Europe,
Africa, the Middle East, Asia and South America and how this participation marked a tangible
demonstration of Ireland’s commitment to the pursuit of international peace2. This paper will
use that anniversary, which shone a light on the demanding PSO conducted by the Defence
Forces from the second half of the 20th century onwards, as a platform to consider what PSO
challenges future generations of the Defence Forces may face and what role innovation, and in
particular innovation in military education, future structures of the army and the role of the
Reserve Defence Forces (RDF), is likely to play in determining how they will plan, train for and
execute PSO.
174
The Defence Forces and Future Peace Support Operations.
175
The Defence Forces and Future Peace Support Operations.
Contemporary PSO
However, in the early 1990s, it became apparent to both the UN and the international
community, especially following the Bosnian and Rwandan genocides, that the traditional
model of peacekeeping that had served the organisation during the Cold War was no longer
effective. Traditional peacekeeping operations were insufficient to deal with post-Cold War
intra state conflict, where civilians rather than armed forces were deliberately targeted by armed
groups conducting asymmetrical warfare.7 These challenges required a new type of peacekeeping
response and the UN reacted by gradually expanding its field operations from the traditional
model, to today’s complex multi-dimensional operations which are designed to ensure the
implementation of comprehensive peace agreements and assist in laying the foundations for
sustainable peace8. Although the military remain the backbone of most peacekeeping operations,
there are now many faces to modern peacekeeping including police officers and a range of
civilians such as legal experts, electoral observers, human rights monitors, civil affairs officers,
gender advisors and governance specialists.9 The Security Council mandates authorising these
PSO have also changed and today 95% of all UN mandated peacekeepers are on missions
where their priority tasking is no longer to monitor ceasefires or separate belligerents but rather
the protection of civilians10. In 2019 Defence Forces personnel operate under such protection
mandates in Lebanon, Mali and the Democratic Republic of the Congo.11 The requirement
to protect civilians is likely to continue well into the future as despite having been a mandated
task for all new missions established since 1999 there are still thousands of civilians killed in
armed conflict each year worldwide12.
176
The Defence Forces and Future Peace Support Operations.
as have experts in remotely piloted aircraft systems and disarmament, demobilisation and
reintegration. The Defence Forces now also deploy specialist personnel, on request from the
Department of Foreign Affairs and Trade, to Irish embassies worldwide to assist consular staff,
normally during periods of heightened security or crisis management and since 2007 they have
also participated in the EU’s Battlegroups14.
Training Teams
In 2010 a military training team was deployed abroad for the first time as part of the EU
Training Mission to Somalia. Its task was to train the emerging post-civil war Somalian national
army. A similar team has been deployed to Mali since 2013 and in 2018, again for the first time,
the Defence Forces deployed a UN requested mobile training and education team to Burkino
Faso to assist that country’s army’s PSO pre deployment training for the UN Mission in Mali.15
Therefore, this paper suggests that training post conflict militaries to international standards
as well as assisting non-western militaries to operate in a PSO environment will become a
significant role for the Defence Forces in the coming decades. It is perhaps worth noting from
a planning perspective the importance that our nearest neighbours, the British Army, have
given to such training operations. Their infantry corps has been restructured to create four
specialised units which contribute to the United Kingdom’s overseas defence engagement, by
deploying a series of 12-man teams, each consisting of highly qualified soldiers, to train, advise,
assist and mentor foreign militaries.16
Non-combatant evacuation
In 2011 the non-combatant evacuation of Irish citizens from Libya17 saw the Air Corps deploy
fixed wing aircraft abroad for the first time in a crisis management role. While that was a
relatively small scale operation, larger evacuation operations involving Irish or indeed EU
citizens would require an innovate use of limited Defence Forces resources in the coming years
to procure appropriate vessels, vehicles and aircraft as well as training that would facilitate
combined naval, air, land and special forces personnel that such off island operations may
demand. Defence Forces planners considering the potential likelihood of such operations in
the coming years, will have taken note of the 2019 decision of the Department of Foreign Affairs
and Trade, to tender for the first time to procure the services of a global security company to
provide it with worldwide security advice and assistance including evacuation at short notice
for its officers and their eligible dependents. Media reports concerning this tender noted that
14 For an overview of these operations see O’Brien, Timothy. “The Origins and Evolution of Defence Forces Peacekeeping”, An Cosantóir 78,
No. 5(2018): 12-14.
15 Ibid., 12-14.
16 For examples of these types of training missions see https://www.army.mod.uk/deployments/africa/
17 For details of the successful evacuation of 115 Irish nationals and family members from Libya see https://www.dfa.ie/news-and-media/press-
releases/press-release-archive/2011/march/successful-evacuation-irish-citizens-from-libya/-taoiseach-praises-successful-evacuation-of-irish-
citizens-from-libya.php and Lally, Conor. “BBC interview may have made Smith’s bid to get home more difficult”, Irish Times, July 6, 2019:2.
177
The Defence Forces and Future Peace Support Operations.
Irish diplomatic staff currently operate in several regions with a recent history of instability
including Sierra Leone, Palestine, South Sudan, Syria and the Central African Republic.18
Naval Operations
In May 2015 there was a momentous occasion for the Defence Forces, arguably of equal
significance to the army’s 1960 deployment to Congo, when the Naval flagship LÉ Eithne
deployed to the Mediterranean to take part in, what were initially bilateral migrant rescue
operations with the Italian navy, before the government subsequently approved follow on naval
vessels to participate in the EU’s naval force in the Mediterranean19. Naval vessels continued
to deploy as part of that force until 2018 and this paper suggests that similar deployments are
likely to occur in the coming years as Naval Vessels form part of multinational UN, EU or
NATO-led maritime task forces.
178
The Defence Forces and Future Peace Support Operations.
developing their understanding of single service, joint, combined and multi-agency operations.
Given the overarching trends highlighted in the 2015 White Paper on Defence, the new
course’s training objectives include helping students to develop a comprehensive grasp of
strategy, security, communications and defence in political, international and financial
contexts. Graduates will have an enhanced understanding of the national and international
context within which the Defence Forces operate, covering policy and strategy, diplomacy,
politics, economics and military technological trends24.
179
The Defence Forces and Future Peace Support Operations.
Defence Forces both the army and the naval service have a proven record of operating in a
multinational environment, with the UN since 1958, the EU since 1991 and NATO since 1997,
since the establishment in 1960 of the very first unit to serve overseas in the Congo, the army
has, with minor exceptions28, always chosen to establish new units to deploy overseas29. These
units train, deploy and are then disestablished as soon as they return home. In many cases these
units often bear no resemblance to those existing in the current Defence Forces structure. PSO
units currently deployed by the army in Lebanon and Syria are in effect mechanised infantry
heavy, all arms battlegroups30, but such units do not exist in the army’s established organisation.
What this means in effect is that for each deployment of a unit overseas, commanders and
staff officers throughout the army must expend considerable effort in establishing these units,
normally by bringing together soldiers from a disparate number of units and locations. This is
arguably an inefficient way to conduct force generation for PSO and this paper suggests that
an important future innovation will be to restructure the army so that its units are equipped to
conduct PSO, without extensive outside assistance.
Conclusion
On 28 June 2019, the 61st anniversary of the first PSO deployment, there were 676 members of
the Defence Forces serving on UN, EU, OSCE and NATO led operations. They were deployed
as mechanised infantry units in Lebanon and Syria, as military observers in Western Sahara
and in the Middle East, as training teams in Mali and as land and maritime headquarter
28 The deployment of the ARW to Liberia and Chad, as well as the deployment of ARW and Infantry Battalion personnel as part of a New
Zealand Battlegroup to East Timor.
29 This approach has its origins in the 1960 decision of the then Chief of Staff, Lt Gen Sean McEoin to task each of the army’s Commands
to provide an infantry company for 32nd Infantry Battalion. Speaking in 1995 Lt Gen McEoin stated that this was “the easiest possible way” to
establish an overseas unit given the time constraints involved. In 1978 as the 43rd Infantry Battalion was being established to deploy to Lebanon,
DFHQ planners considered “the possibility of making a break with the past and sending out an existing battalion, or at least basing the unit on
an existing battalion”. This possibility was however disregarded as being impractical for a diverse, but unrecorded set of reasons. See E.D Doyle,
“The Beginning of UNIFIL”, An Cosantóir, 48 (10), October 1998,8.
30 A battlegroup, in the Defence Forces context, would consist of a combined arms battalion, reinforced with combat support and combat
service support elements
31 Department of Defence. White Paper on Defence. Dublin: Defence Forces, 2015.
32 Fitzgerald, Wayne. “The Reserve Defence Forces Supporting the Front Line”, An Cosantóir 78, No. 7 (2018): 13.
33 Cleary, Brian. “Director with Responsibility for Reserve Forces”, Connect 22, No.3 (2018):1
180
The Defence Forces and Future Peace Support Operations.
staff throughout Africa, the Middle East, the Mediterranean and the Balkans. At home, 152
soldiers were preparing to commence training for a German army led EU battlegroup,34 while
members of the Army Ranger Wing were preparing to deploy to the UN PSO in Mali35. The
ability of the Defence Forces to conduct such a diverse range of operations is a function of their
training, leadership and equipment. Additionally, this paper has demonstrated how the current
generation of peacekeepers have innovatively built on the experience of their predecessors
in responding to the demands of contemporary PSO. The paper has also highlighted how
educational initiatives in the organisation are preparing the next generation of peacekeepers to
deal with whatever challenges the future holds. Finally, in the spirit of innovation, the author
has suggested some changes to the army’s structure and to government policy on the RDF
which would potentially enhance the ability of the Defence Forces to conduct PSO in the lead
up to the 22nd century.
34 O’Halloran, Marie. ‘Dáil to debate Army’s EU role’, Irish Times,25 June 2019.
35 O’Halloran, Marie. ‘Army Rangers set for Mali mission’, Irish Times,21 June 2019.
181
182
MEETING MULTIPLE THREATS
IN AN UNCERTAIN FUTURE
Wesley Bourke
Chief Executive Officer (CEO), The Irish Military Heritage Foundation
Meeting multiple threats in an Uncertain Future
Abstract
A new chapter in world history has opened filled with uncertainty. The defence and
security environment have never been more obscure. China, Iran and Russia – are
increasingly asserting themselves on the world stage; geopolitics is back.1 A further
challenge are Non-State Armed Group – Islamic State of Iraq and the Levant or trams-
national drug traffickers for example – whose presence and impacts have destabilising
effects regionally and globally. The use of hybrid threats - a combination of low risk
activities including the use of organised crime, cyber-attacks, and information disruption
– is becoming commonplace. The above challenges generally take place in a space
regarded as the ‘gray zone’ resulting in strategic disruption rather than all-out war.
The challenges posed from the broader security spectrum - climate change, food
security, bad governance for example – have risen substantially. They not only directly
challenge a state’s ability to provide for its people, but can become threat multipliers by
interacting and converging with other existing risks and pressures thus increasing the
risk of fragility or violent conflict.
In an era where traditional distinctions between defence and security are becoming
increasingly blurred, what approach a state should take to meet the uncertainties of the
21st century is a prevailing question. In order to predict, prevent, and manage these
challenges this paper promotes a holistic intergovernmental approach at an international
level, mirrored with a whole-of-government approach at a national level. Such an
approach will maximise all available resources to meet challenges head on.
184
Meeting multiple threats in an Uncertain Future
Over the last decade, the security spectrum has shifted again causing the international
community to take note. The EU’s 2016 Global Strategy noted: ‘To the East, the European
security order has been violated, while terrorism and violence plague North Africa and the
Middle East, as well as Europe itself’.7 The strategy identified five broad security priorities that
endanger the EU’s future: ‘terrorism, hybrid threats, climate change, economic volatility and
energy insecurity endanger our people and territory’.8 The strategy further outlines the need
for further integration with partners to predict, prevent, and manage conflicts and crises.9
The updated framework provides for the ‘integration of environment into security, paving
the way towards a more holistic approach and interaction between the foreign, security and
defence’ spheres.10
The UN is still the optimal organisation when it comes to international law, peacekeeping,
monitoring, mediation and disarmament, demobilisation and reintegration. It is complemented
and supported by other IGOs including the EU. NATO has adopted a strategy of ‘projecting
stability’ in which the ‘alliance helps to project stability in many different ways – including
through its operations, by training partner countries’ armed forces, and through political
engagement and dialogue’.11 The OSCE specialises within the fields of early warning, conflict
prevention, crisis- management and post-conflict rehabilitation. 12
185
Meeting multiple threats in an Uncertain Future
U.S. dollars 16 Through their own IGOs - Shanghai Cooperation Organisation, the Collective
Security Treaty Organization, and the Eurasian Economic Union – China and Russia are
building regional economic and military partnerships. In 2013 China launched a global
development strategy; One Belt, One Road (renamed the Belt and Road Initiative (BRI)); a
global network of land and maritime silk roads with an aim to invest in infrastructure in 152
countries and international organisations. The BRI has been described as a reincarnation of
China’s Tribute system, while growing China’s economic power it is winning allies through
soft power attributes such influence, investment and trade.17
Over the past decade confrontations with the revisionist states have taken place in a space
referred to as the ‘gray zone’. These activities are not formal wars and do not resemble traditional
state on state conflicts; strategic disruption is generally the result. While some aggression or
use of force is used, ambiguity about the ultimate objective is a defining feature.18 This results
in the international community or the recipient state unsure how to respond. During Russia’s
annexation of Crimea in 2014 the U.S. and the EU could do little. Grygiel and Mitchel have
put forward that the western powers have an extensive ‘periphery or frontier problem that
invites probing’.19 Rather than directly challenging the west, the revisionist states are making
probing actions along areas of weakness. To the international community these ‘probes’ at
times can seem like minor infractions. The revisionist state then uses the failure of the west to
react to its political advantage.20
The use of Non-State-Armed-Groups (NSAGs) and hybrid threats are two common characteristics
of the ‘gray zone’ and probes. NSAGs - extremist groups, warlord led militias, organised crime
networks – at times with their own proto-states or fiefdoms such as Islamic State of Iraq and the
Levant, operate outside the realms of state governance. They can be used by or supported by
states to carry out proxy or third-party activities. 21 NSAGs are a threat multiplier exasperating
security issues including poverty, migration, human rights.
Hybrid threats are used by states and NSAGs to exploit an adversary’s vulnerabilities. There
are many definitions of hybrid threats. The European Centre of Excellence for Countering
Hybrid Threats best characteristics the unique attributes: a wide range of low risk and
ambiguous methods and activities including: ‘influencing information; logistical weaknesses,
[e.g. targeting] energy supply pipelines; economic and trade-related blackmail; undermining
international institutions by rendering rules ineffective; terrorism or increasing insecurity’.22
Ambiguity can be further exploited with the use of third parties such as non-combatants in
the carrying out of cyberattacks. For the most part NSAGs and hybrid threats cause strategic
disruption rather than direct conflict.
‘Gray zone’ or ‘probe’ activities are not unique to the 21st century, many have reflections of
the Cold War. Since 2014 Russia has continued to influence destabilising activities in eastern
16 “Russia, China to sign agreement on payments in national currencies, says decree,” TASS Russian News Agency, (5 June, 2019)
url: https://tass.com/economy/1061848 Retrieved: 1 September 2019.
17 Md. Nazrul Islam (ed), Silk Road to Belt Road: Reinventing the Past and Shaping the Future (Singapore: Springer, 2019); R. James
Ferguson, Rosita Dellios, The Politics and Philosophy of Chinese Power: The Timeless and the Timely (Lexington: Lexington Books, 2016)
18 Frank G. Hoffman, “Examining Complex Forms of Conflict: Gray Zone and Hybrid Challenges,” PRISM Vol. 7 no. 4, (2018): 30–47.
19 Jakub J. Grygiel and A. Wess Mitchel, The Unquiet Frontier: Rising Rivals, Vulnerable Allies, and the Crisis of American Power (Princeton:
Princeton University Press), 52.
20 Ibid, 64-66.
21 C. Hofmann and U. Schneckener, “Engaging Non-State Armed Actors in State- and Peace-building: Options
and Strategies,” International Review of the Red Cross, Vol. 93, no. 883 (2011): 2-3.
22 The European Centre of Excellence for Countering Hybrid Threats. url: https://www.hybridcoe.fi/hybrid-threats/ retrieved: 5 September 2019.
186
Meeting multiple threats in an Uncertain Future
Ukraine and has deployed military assets in support of the Assad regime in Syria; with some in
the west seeing it as a proxy war. Iran has repeatedly tested the wests resolve by using Hezbollah
as a proxy to antagonise Israel; the continuing slow-motion nuclear proliferation crisis;
continuing threats to oil supplies; challenging movement in the Arabian Sea; and support
for the Houthis in Yemen. China’s aggressive territorial claims and island militarisation in
South East Asia is some ten years old. The west’s limited response in many of these cases
has resulted in allies in the Baltic and South East Asia questioning if they will be protected if
directly attacked.23
While these actors may be ‘light years away from creating an anti-Western alliance,’ their IGOs
and their growing global influence is providing an incentive for states ‘to seek to strengthen the
cooperation with like-minded states within IGOs,’ whilst still providing a rules-based-system.24
Both Serbia and Turkey – a NATO member – have sought such cooperation for example.
Robert Kagan has put forward a long-cycles-of-history hypothesis. He argues that it is only a
question of time before former powers re-emerge.25 More recently Margaret MacMillan’s essay
‘The Rhyme of History: Lessons of the Great War’ makes the analogy between 1914 and 2014
making the point that geo-politics is back.26 It is unlikely these actors seek an all-out war.
Their activities would indicate geopolitical jousting will be confined to the ‘gray zone’ for the
foreseeable future.
187
Meeting multiple threats in an Uncertain Future
security bridges chronic climate-related risks with human security such as famine, disease and
rights violations. Climate security and its exasperation of as a threat multiplier is understood
by states. 31 Internationally United Nations (UN) Secretary-General, António Guterres, warned
in 2016: ‘Many conflicts are triggered, exacerbated or prolonged by competition over scarce
natural resources; climate change will only make the situation worse’.32 As an example of the
effects of climate change can be shown in Lake Chad which has shrunk by 90% in 40 years. The
calamity has exacerbated existing inequalities, poverty and political instability; in turn leading
to violent conflict and population displacement. With abundant food and water shortages,
seven million people are suffering and two million displaced. The region became a breeding
ground for NSAGs Boko Haram and Islamic State West Africa.33
With a global population that could grow to around 8.5 billion in 2030, 9.7 billion in 2050,
and 10.9 billion in 2100., the increased stresses put on the world’s resources by climate change
is extreme.34 Building the capacity for IGOs and states to manage stress, and ultimately prevent
risks, emerging from climate change is vital.35
31 Karen Parrish, “Hagel Announces DOD's Arctic Strategy,” DoD News (22 November, 2018)
url: https://archive.defense.gov/news/newsarticle.aspx?id=121220 retrieved: 20 June, 2019.
32 “UN Environment Annual report 2016,” United Nations (2016)
url: https://www.unenvironment.org/annualreport/2016/?page=0&lang=en retrieved: 15 May, 2019.
33 Kettunen, Noome and Nyman, Think 2030: Reinforcing Environmental Dimensions of European Foreign and Security Policy, 8.
34 United Nations Report, World Population Prospects 2019: Highlights (New York: United Nations, Department of Economic and Social Affairs,
Population Division, 2019), 1.
35 Lisa M. Dellmuth, Maria‐Therese Gustafsson, Niklas Bremberg, Malin Mobjörk, “Intergovernmental organizations and climate security:
advancing the research agenda,” WIREs Climate Change, Vol. 9, no. 1 (January/February 2018).
36 European Political Strategy Centre Brief, Joining Forces The Way Towards the European Defence Union (Brussels: EPSC, 2019)
37 NATO: KFOR - JFC Naples. url: https://jfcnaples.nato.int/kfor retrieved: 15 September, 2019.
38 S. Eckhard & H. Dijkstra, “Contested implementation: The unilateral influence of member states on peacebuilding policy in Kosovo,” Global
Policy, Vol. 8 (S5) (2017): 102–112; EEAS: European Union Office in Kosovo - European Union Special Representative in Kosovo. url: https://
eeas.europa.eu/delegations/kosovo_en retrieved: 15 September, 2019.
188
Meeting multiple threats in an Uncertain Future
189
Meeting multiple threats in an Uncertain Future
security, economic and administrative domains. This requires donor countries to adopt a WoG
approach that will enable the donor state to respond with all available resources: security,
political, economic affairs, as well as those responsible for development and humanitarian
assistance.45 A successful WoG engagement in fragile states will result in ‘a well-sequenced and
coherent progress across the political, security, administrative, economic, and humanitarian
and emergency domain’.46 WoG approaches to the broad security spectrum have been employed
by states including Australia, Finland, New Zealand, United Kingdom (U.K.), and the U.S.47
There are challenges to WoG, an example of which can be found in climate change. Tackling
climate change has proven a challenge for states; there still remains a disconnect between
climate change and security. This has resulted in states and their departments developing
different approaches to framing and understanding climate change.48 To overcome such
challenges ‘all stakeholders should have the same vision and buy-in to the same strategic
priorities; furthermore, they should be consulted from the beginning’.49 Fostering interagency
cooperation and understanding can be achieved through joint multiagency training and
exercises; and multiagency joint monitoring and readiness centres.50 Recognising the complexity
of the challenge Australia developed the National Security Capability Plan which provides a
single consolidated picture of the capabilities that enable their nation to achieve national
security outcomes.51 Understanding the broad sphere of defence and security challenges ahead,
Australia ‘implemented several institutional transformations to ensure effective coordination
and integration within the National Security Community’.52
Conclusion
Our holiday from history is over. The future is here now. States have to be prepared for all
eventualities including thinking the unthinkable. Reacting to challenges is no longer enough,
they need to be predicted and met head on before they escalate. Leaving the issues siloed within
individual departments will leave a state fundamentally unprepared to adequately manage and
prepare for all challenges. The solution is not as opaque as it may seem; a clear strategic objective
supported by a balanced framework is a guiding principle. To meet the brood and uncertain
challenges requires the international community and states to utilise all available resources.
This can be achieved through a comprehensive holistic approach delivered through IGOs and
mirrored by a supporting state WoG defence and security framework. This approach will lead
to synergy between state agencies, cohesion, capability, capacity, and an adaptable leadership
that will ensure a state’s ability not just to react to challenges but predict and prevent them.
45 OECD “Principles for Good International Engagement in Fragile States.”
46 OECD, Whole of Government Approaches to Fragile States, 17-18.
47 Centre for Effective Services Briefing Paper, A Primer on Implementing Whole of Government Approaches (Dublin: CES, 2014), 3; For
examples see: Her Majesty’s Government, National Security Capability Review - Including the second annual report on implementation of the
National Security Strategy and Strategic Defence and Security Review 2015 (London: Her Majesty’s Government, 2018); Simo Nikkar (et al),
“Joint External Evaluation of Finland: Enhancing Health Security through a Comprehensive Whole-of-Government Approach,” Public Health
Panorama, Vol. 4, issue 1 (March 2018), 91-99.
48 Overseas Development Institute Working Paper, Climate change in UK Security Policy: implications for development assistance? (London:
Overseas Development Institute, 2012), 13.
49 Centre for Effective Services Briefing Paper, A Primer on Implementing Whole of Government Approaches, 4.
50 James W. Derleth, “Fostering a Whole-of Government Approach to National Security from the Bottom Up Interagency Training at the Joint
Multinational Readiness Center,” Military Review, online exclusive, (February, 2018) url: https://www.armyupress.army.mil/Journals/Military-
Review/Online-Exclusive/2018-OLE/Feb/Fostering-Security/ retrieved 10 September 2019.
51 Australian Government, Guide to Australia Capability Plan. (Belconnen ACT: Australian National Security, 2013), 3.
52 Aaron Philip Waddell, “Security Community Integration in Australia: Cooperation and Integration among Australia’s National Security
Community,” Studies in Intelligence Vol. 59, no. 3 (2015), 25.
190
THE EUROPEAN MILITARY
AIRWORTHINESS
FRAMEWORK AS A DEFENCE
FORCE ENABLER AND AN
INTERFACE WITH THE IRISH
AVIATION INDUSTRY
Dr Kyriakos I. Kourousis
Senior Lecturer (Associate Professor), School of Engineering of the University of
Limerick.
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
ABSTRACT
Airworthiness is a key enabler for mission capable defence aircraft, both in peace and
conflict time. The European Defence Agency (EDA) has identified in 2008 the need for
harmonisation in airworthiness across the European Union (EU), establishing the Military
Airworthiness Authorities’ Forum and the European Military Airworthiness Requirements
(EMARs). EMARs have progressively evolved to a comprehensive framework for
managing the design, manufacture, operation and maintenance of defence aircraft within
the EU and beyond. The basis of the EMARs is the civil aviation regulatory set of the
European Aviation Safety Agency (EASA), adapted to cater for the defence aviation
environment. The EMARs have aligned defence regulations with best practice from civil
aviation, offering greater focus on safety and a vehicle for efficient interaction with the
aviation industry. Moreover, the EMARs enabled a much needed intra and inter-state
regulatory standardisation, with a positive impact on interoperability within the EU and
the North Atlantic Treaty Organisation (NATO). The Irish Air Corps (IAC) operates a
highly diverse fleet of twenty-five aircraft, of seven different types, the majority of which
are civil-certified. The performance of aircraft maintenance, management of continuing
airworthiness and engineering design changes are governed by the IAC Military
Airworthiness Authority (MAA) rules. The adoption of the EMARs has yet to be realised
by the IAC, except for the EASA-approved Technical Training School. The retention
of an Irish Defence Forces’ specific airworthiness framework does not allow Ireland
to harmonise with other EU states that have transitioned to the EMARs (e.g. United
Kingdom, France, Germany, Sweden, Spain, Netherlands, Portugal), as well as limits
the opportunities for interaction of the IAC with the vibrant Irish aviation industry. This
paper presents the operational and cost implications of this regulatory disconnect,
complemented by a discussion on the benefits of the EMARs’ adoption by the IAC.
Military Airworthiness
In broad terms, airworthiness is the condition of a civil or military aircraft for safe operation.
Perhaps the most accurate and complete definition of airworthiness comes a historical
regulation of the Australian Defence Force, which describes it as a concept:
“…the application of which defines the condition of an aircraft and supplies the basis for judgment of
the suitability for flight of that aircraft, in that it has been designed, constructed, maintained
and operated to approved standards and limitations, by competent and authorised individuals,
who are acting as members of an approved organisation and whose work is both certified as correct
and accepted on behalf of Defence.”1
Moreover, in this definition one can find the activities encompassed by the two distinct (yet
interconnected) domains of airworthiness, that of:
• Initial Airworthiness, design and construction of aircraft;
• Continuing Airworthiness, maintenance and operation of aircraft.
1 “Glossary of Terms”. Australian Defence Force AAP 7001.053 Technical Airworthiness Management Manual, Last modified July 3, 2019. http://
www.defence.gov.au/dasp/Docs/Manuals/7001053/eTAMMweb/1307.htm
192
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
In civil aviation, the International Civil Aviation Organisation (ICAO) offers the overarching
framework for the regulation of commercial aircraft airworthiness. Each of ICAO state is
responsible to implement, in a legislated way, this high-level policy. State aircraft, including
military aircraft, are specifically excluded from the ICAO provisions. In military aviation, there
is no equivalent to ICAO, with each state utilising a unique set of airworthiness rules, orders,
etc., for their military aircraft. This is mainly attributed to the role of military aviation, which
is to maintain war capability. This role imposes additional, or even, contradicting requirements
to airworthiness. Historically, this has led to a fragmented regulatory environment at
international level, despite the apparent and unavoidable interactions between different states
or even between defence services within the same state (i.e. Air Force, Army, Navy).
Initial Airworthiness
• EMAR 21: Certification of Military Aircraft and related Products, Parts and Appliances
and Design and Production Organisations.
Continuing Airworthiness
• EMAR M: Continuing Airworthiness Requirements;
• EMAR 145: Requirements for Maintenance Organisations;
2 “Military Airworthiness Authorities (MAWA) Forum”, European Defence Agency, Airworthiness, Last modified July 4, 2019. https://www.eda.
europa.eu/experts/airworthiness/mawa-forum
3 “Approved MAWA Documents”, European Defence Agency, Airworthiness, Last modified July 4, 2019. https://www.eda.europa.eu/experts/
airworthiness/mawa-documents
193
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
4 Purton, Leon and Kourousis, Kyriakos. “Military Airworthiness Management Frameworks: A Critical Review”. Procedia Engineering 80 (2014):
545-564. https://doi.org/10.1016/j.proeng.2014.09.111
5 “Air Corps”, Irish Defence Forces, Last modified July 10, 2019 https://www.military.ie/en/who-we-are/air-corps/
194
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
Under this umbrella definition of the IAC role, aircraft can be assigned a range of missions:
army support, air ambulance, military transport, Presidential, Ministerial and VIP transport,
general utility, Garda air support, offshore & inshore maritime patrol, search and rescue top
cover, parachuting operations, escort surveillance & monitoring, inshore fishery patrol, drogue
towing, ab-initio/advanced/instructor pilot training and close air support. In turn, to fulfil
these roles, the IAC operates a highly diverse fleet of twenty-five aircraft, of seven different
types, the majority of which are civil-certified6.
In reviewing the organisation of the IAC on airworthiness management one can find in the
Defence Force website7 a basic overview of the IAC structure and units, including a reference to
a Military Airworthiness Authority (MAA). Thus, two secondary sources were used to obtain
information on the IAC airworthiness system, an independent review conducted in 20158 and
a previously published article in the Defence Force Review9.
The responsibility of the IAC aircraft airworthiness belongs to the General Officer Commanding
(GOC), obtained through successive delegation from the Minister of Defence to the Defence
Force Chief of Staff. It is understood that airworthiness in the IAC is governed by a set of
internal rules, the implementation. This set of rules are described in the Air Regulations
Manual (ARM), issued by the GOC. It is noted that Air Regulations are not part of the
Defence Force Regulations, which are issued by the Minister of Defence. In particular, the
Defence Act 1954 stipulates that the Minister of Defence is authorised to regulate the “The
flying, certification and maintenance of service aircraft and the certification and maintenance
of service aircraft material.”10. Instead, the issuance of Air Regulations is another responsibility
delegated (directly) from the Minister of Defence to the GOC, via the Defence Regulation11
The GOC is supported and advised by the MAA. In particular, the scope of work of the MAA
includes:
• Oversight of the Air Regulations’ implementation (i.e. issuance of technical and flight
operations’ instructions, certification of staff, approval of maintenance programs, accident/
incident investigation, aircraft modifications, liaison with aircraft Type Certificate holders,
etc.);
• Advising of the GOC on airworthiness matters (i.e. new equipment/tender specifications,
civil aviation regulations impacting IAC aircraft operation, etc.).
A synoptic overview of the IAC airworthiness management construct is illustrated in Figure 1.
6 “Air Corps Fleet”, Irish Defence Forces, Last modified July 10, 2019. https://www.military.ie/en/who-we-are/air-corps/the-fleet/
7 “About the Air Corps”, Irish Defence Forces, Last modified July 10, 2019. https://www.military.ie/en/who-we-are/air-corps/about-the-air-corps/
8 Corcoran, David. “Just Flight Safety Culture and the Irish Defence Forces: It’s A Question of Law!” Defence Forces Review (2016): 197-216.
9 Irish Aviation Authority. Independent review into allegations concerning the certification, qualification and experience of Air Corps Aircraft
Inspectors, by E. Sullivan, N. Butterfield and M. Purcell, December 3, 2015.
10 Defence Act [1954-1987].
11 Defence Force, Defence Forces Regulation CS 8 - Air Corps Military Aviation Regulations and Directives, July 20, 2012.
195
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
12 “Part 147 Approved Training Organisations”, Irish Aviation Authority, Last modified July 10, 2019 https://www.iaa.ie/personnel-licensing/
maintenance-engineer---amel-licensing/part-147-approved-training-organisations-1
196
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
As discussed, harmonisation between States’ practices in the airworthiness field is one of the
main objectives (and deliverables) of the MAWA Forum. The lack of harmonisation with other
EU States that have adopted the EMARs is a limiting factor for expanding and improving the
interactions with these States but also with the Irish aviation industry. Closer interactions
are especially important for a defence aircraft operator of the size of the IAC, as the level
of commonality of an airworthiness system with other civil/military systems is a positive
contributor to achieving economy of scale.
To summarise, reducing regulatory fragmentation, establishing an independence in the
airworthiness management roles and responsibilities and promoting harmonisation are
considered some of the main reasons to initiate changes in the IAC airworthiness system.
Moreover, these reasons will have to be assessed in conjunction with the benefits that an
EMAR-based airworthiness system can offer to the IAC (discussed in the next section).
Nevertheless, as with every change, especially of this magnitude, one would need to examine
the challenges associated. The implementation of the EMARs requires the establishment of a
suitable legal instrument, which, in the case of the IAC, would be a new Defence Regulation,
issued by the Minister (as per the provisions of the Defence Act 1954). This new Defence
Regulation is necessary to provide the Basic Regulation as the framework (basis) for the EMARs-
derived set of airworthiness regulations. This Basic Regulation would reflect the EASA Basic
Regulation, with adaptions, similarly to the approach followed by the Australian Defence Force
in their adoption of the EMARs13.
Benefits of the EMARs for the Irish Air Corps and the Irish
Aviation Industry
An effective and efficient airworthiness system can be an enabler for the Irish Defence Force.
Moreover, linkage of the IAC with the vibrant aviation industry is an opportunity offered
by adopting a civil-based airworthiness system. In line with the aforementioned reasons for
a change in the existing IAC airworthiness system, the adoption of the EMARs can offer
substantial benefits.
Aviation safety can be enhanced by following best regulatory practice from civil aviation.
Namely, the EASA system (mirrored by the EMARs) can be a positive contributor to safety. In
a report accompanying the 2015 Defence Forces Climate14 a number of safety concerns were
reported in connection to organisational matters, i.e.:
• “We can’t do things safely. We need to say no to outputs.”, indicating possible discrepancies
in the airworthiness decision making processes;
• “It keeps us up at night.. ‘is this safe’… we are signing off on people who don’t have experience”,
implying a lack of confidence in the maintenance staff certification process;
• “We are double and triple jobbing. That would be illegal in the private sector”, illustrating a low
esteem for the defence regulations.
13 “Defence Aviation Safety Regulation”, Australian Defence Force, Last modified July 10, 2019 http://www.defence.gov.au/DASP/Docs/
Manuals/8000-011/DASRWeb/index.htm#8797.htm
14 “Workplace Climate in the Defence Forces” Phase 2: Results of the Focus Group Research, Last modified July 14, 2019
https://www.defence.ie/system/files/media/file-uploads/2017-12/workplace-climate-defence-forces.pdf
197
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
However, it is noted these claims, and the assumption that the EMAR-based system can improve
the safety record, cannot be fully substantiated due to the unavailability of safety performance
indicators for the IAC.
Standardisation in the airworthiness standards, specifications and processes can be achieved
through the adoption of EMARs and the associated/supporting documents. The benefit of
standardisation can be witnessed in some recent examples of specifications published for new
aircraft procurement purposes. In particular, in the Request for Tenders (RfT) for a new fixed
wing utility aircraft15 and the Request for Proposals (RfP) for a new maritime patrol aircraft16
issued by the Irish Department of Defence, one can find references to EASA certification
specifications, combined with requirements reflecting in practice certification specifications
(examples of such references are provided in Table 1). This can be considered as a reflection of
limited standardisation, which may have an impact on the accurate capture and definition of the
certification specifications. Most importantly, under an EMARs-based system, the certification
basis of new aircraft can be defined in an accurate way and tailored, where necessary, to the
needs, operating environment and available budget of the Irish Defence Force.
Request for Appendix 1: Requirements and Specifications: All configurations and equipment must be
Tenders (RfT) for Type Certified or Supplemental Type Certified
a new fixed wing 1. Specification (STC), or another standard, which meets the
utility aircraft15 1.4 Applicable Documents requirements of the Irish Air Corps Military
Airworthiness Authority (MAA).
Appendix 1: Requirements and Specifications: The contractor must design, build, install,
test and certify the proposed aircraft to the
2. Scope of Work/Aircraft Configuration requirements of EASA CS23.
2.1 General Aircraft Requirements
Request for 4. Qualification Criteria b. The aircraft must be built to EASA CS25
Proposals or equivalent standard. All additional items
(RfP) for a new fitted to the aircraft must have manufacturers’
maritime patrol Supplemental Type Certification (STC).
aircraft16
t. The aircraft must have extensive, evidence
based Corrosion Prevention measures, including
paint schemes, airframe and engine-wash
programmes, panel sealing, internal cavity
liquid protection, and corrosion inspection
programmes.
Table 1. Examples of references to airworthiness requirements from Request for Tenders (RfT) and Request for
Proposal (RfP) documents issued by the Irish Department of Defence.
15 Department of Defence, Request for Tenders for the Supply of Fixed Wing Utility Aircraft for the Irish Air Corps, Reference CON/0013/2017,
May 4, 2017.
16 Department of Defence, Request for Proposals for the Supply of Maritime Patrol Aircraft (MPA) to the Irish Defence Forces, Reference
CON/001/2018, May 11, 2018.
198
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
Linkage with the Irish civil aviation sector can be facilitated by adopting the (EASA-based)
EMARs. Examples of such interactions include:
• Outsourcing of IAC maintenance work to Irish-based EASA Part 145 Aircraft
Maintenance Organisations where and as necessary;
• Outsourcing of IAC engineering design and production work to Irish-based EASA Part
21J Design and Part 21G Production Organisations;
• Outsourcing of IAC fleet management to EASA Part M Continuing Airworthiness
Management Organisations (CAMOs);
• Inward and outward mobility of EASA Part 66/EMAR 66 civilian/IAC licenced aircraft
maintenance technicians and mechanics, enabling the quick filling of skills/man-hour
gaps in the Irish civil and military aviation industry;
• Offering of helicopter basic and type training by the IAC EASA Part 147/EMAR 147
Maintenance Training Organisation to the Irish, EU and international civil aviation
industry (currently no EASA Part 147 Maintenance Organisation in Ireland offers such
training courses).
Work satisfaction of the IAC staff can be improved by working within a modern civil-based
airworthiness management system. As identified in the 2015 Defence Forces Climate survey17,
the measured level of organisational procedural justice (perceptions of staff around the
organisation’s fairness in terms of procedures and policies) suggest dissatisfaction. Moreover,
the acquisition of globally recognised qualifications (i.e. EASA/EMAR 66 maintenance
licences) is also expected to contribute positively to the morale of the IAC staff, both in terms
of the appreciation exhibited to them from their organisation and future career prospects. This
can have a positive effect in retaining talent in the IAC.
Interoperability can be improved, since servicing of IAC aircraft, pooling and sharing of
human resources and equipment, common training, etc. can be served better by a common
regulatory framework. The EMARs can offer that both at EU and international level
(due to their increasing use by non-EU States). A cross-state operation of IAC can be not
only a force multiplier for the Irish Defence Force (where and as necessary) but also an
opportunity for closer interaction with other military aircraft operators employing advanced
operational practices.
199
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
Assuring the technical integrity of the aircraft (defence capability platform) is what an
airworthiness framework covers. Technical integrity comprises of all those norms, regulations
and practices covering Product, Behaviour and Process (PBP) integrity18 for initial airworthiness
(design and construction of aircraft) and continuing airworthiness (maintenance and operation
of aircraft) assurance. The Product element corresponds to the technical system (aircraft), while
Behaviour covers the human requirements’ element (training, certification, competency of staff),
with the Process element covering all process/procedural requirements and implementation
across the board. The EMARs, as discussed in the previous section, are able to contribute
positively in enhancing aviation safety, standardisation, work satisfaction and interoperability
in the IAC. In effect, these contributions can ensure, in different ways each, the PBP integrity
and enable the short, medium and long-term capabilities of the IAC. The interactions and
the overall relationship between capabilities and the EMARs, as a comprehensive system for
military airworthiness management, are illustrated schematically in Figure 2.
Figure 2. The interaction and relationship between the European Military Airworthiness Requirements (EMARs) and
the Irish Air Corps (IAC) capabilities.
Conclusion
In summary, an EMARs-based systems approach to airworthiness management can:
• Offer a modern military-tailored framework for the airworthiness management of the
diverse fleet and mission profile of the IAC;
• Promote standardisation across the initial and continuing airworthiness functions of
the IAC, including the definition of procurement requirements;
• Enhance the work satisfaction of the IAC staff, with a positive effect in retaining talent;
18 Purton, Leon; Clothier, Reece and Kourousis, Kyriakos. “Assessment of Technical Airworthiness in Military Aviation: Implementation and
Further advancement of the Bow-Tie Model”. Procedia Engineering 80 (2014): 529-544. https://doi.org/10.1016/j.proeng.2014.09.110
200
The European Military Airworthiness Framework as a Defence Force
Enabler and an Interface with the Irish Aviation Industry
• Link the vibrant civil aviation industry in Ireland with the IAC;
• Improve interoperability in EU and international level;
• Offer a comprehensive solution for the assurance of technical integrity;
• Enable the current and future Irish Defence Force capabilities by providing safe and
mission-ready aircraft to the IAC GOC.
The adoption of the EMARs by the IAC is believed to be towards a positive direction, both for
achieving a more effective and efficient airworthiness system. This paper, through its analysis,
hopes to have provided enough details to stimulate further discussion on this matter within
the Irish Defence Force organisation. A full justification and planning of the implementation
of the associated change would be the logical next steps, similarly to several defence
forces in the EU (and internationally) that have decided to transform their airworthiness
management systems.
201
202
Generating Network Centric
Warfare Capabilities within the
Defence Forces.
Capt (AR) Chris O Slatara
CIS School, DFTC.
Generating Network Centric Warfare Capabilities
within the Defence Forces.
Abstract
This paper looks at Mission Command and Network Centric warfare, what advantages
they might bring to the Defence Forces, and how those advantages might be realised.
Mission Command and Network Centric warfare are popular topics. In the modern
military of today it is necessary to practice both in order to operate within, and excel, in
the coalition/battlegroup format espoused by the US Army and NATO. In this paper it is
argued that the Defence Forces can excel in this area with a far lesser expenditure and
effort than might be thought.
204
Generating Network Centric Warfare Capabilities
within the Defence Forces.
However, mission command is not without its drawbacks. With forces that are not trained to a
high standard, or commanders that are not sure of their subordinates, then detailed orders may
be necessary, thus resulting in a lack of flexibility. The US Army refers to Mission Command
as an “approach” (Army, 2019)(Army, 2014) “The Army’s approach to command and control
that empowers subordinate decision making and decentralized execution appropriate to
the situation” is guided by the principles of:
1. Building cohesive teams through mutual trust,
2. Creating shared understanding,
3. Providing a clear commander’s intent,
4. Exercising disciplined initiative,
5. Using Mission Orders,
6. Accepting Prudent Risk.
In the above discussion we have mentioned trust, intent, initiative and mission orders. This
concept of shared understanding will be revisited as it will recur again and again. Risk is
also an important factor – no military option is without risk, but the prudent acceptance
and a decision to proceed is one of the factors that characterizes a commander using
Mission Command. We now mention Shared Understanding – here, what is required is
the creation of a shared understanding of the operational environment, the problems and
approaches of solving those problems and the reasons the operation exists in the first place.
This is no easy task – information management require time and effort to create the shared
understanding – it is rarely done via email and always requires some type of contact to do so.
This, then, begins our journey into Network centric warfare, and we consider again the tribune
leaving Rome to conquer a foreign land, who– he would have understood Mission Command.
205
Generating Network Centric Warfare Capabilities
within the Defence Forces.
206
Generating Network Centric Warfare Capabilities
within the Defence Forces.
Network Centric Warfare and Mission Command from the Irish Point of View
The Irish situation can be explained by looking at the current global trend and identifying
the position in respect to that, and looking at ways to harmonize operational art along those
lines. The politics of the modern defence arena show that operations by the US Military in
the Middle East for the last 20 years (and more) have been focused on coalition operations.
As nearly always the largest provider to said coalition operations, it has been a tenet of their
coalition dealings that partner nations must be able to interoperate with them - and, of course,
this means ‘Robust Networks’ as meant in the context of Network Centric warfare, quite apart
from the nature of staff duties and following NATO Standard Agreements (STANAG)s. This
has followed the practice from NATO, where considerable standardization and networking
meant that forces could interoperate easily and work together to achieve their aims. Ireland’s
participation in European Union Battlegroups practices this from a limited point of view – we
deploy with force packages of Mechanized Infantry Companies which slot into the host nations
force package.
From the point of network centric warfare however, it leaves a lot to be desired as the package,
while networked to some extent, does not accept and build the robust networks in order to
fully exercise the principles of Network Centric Warfare. Participation in exercises such as
VIKING18 shows that considerable effort on several fronts needs more work in order to fully
embrace the concepts and approach of Network Centric warfare. As discussed above, robust
networks and information sharing improves mission effectiveness. In order to gain the benefits
to our forces the correct doctrine, tools and training must be in place. This training must exist
in the HQ - training the staff function. It must exist with the troops on the ground, afloat, or
in the air; it must exist with the IT soldiers keeping these systems running. Unless all three
capabilities (Staff, troops and IT support) are practiced individually, and collectively, Network
Centric Warfare Capability cannot be generated or maintained. The US Army recognizes this
– They have established several centres of excellence, and created troop grades specifically
to assist with this process (Digital Master Gunner), and established several digital ranges to
practice. In addition, all of the training tables to certify and qualify are publicly available, giving
any military personnel wishing to bootstrap themselves a huge leg up.
From the Irish Point of View, the Staff Process remains largely overlay/paper-based when
teaching MDMP (Military Decision-Making Process). There are arguments made strongly on
both sides of this debate, as a very strong case can be made that the nature of the MDMP
process requires that it be able to operate when communications or power has been disabled,
and the Brigade/Formation must still be able to operate, and so commanders at all levels must
be able to revert to doing without computers, if forced to do so.
Separately, participation in any overseas role now requires collaboration, usually with some type
of network centric warfare -enabled platform. This places a very strong drive on staffs to be able
to operate at an exceptionally high level in these roles. Arguably, indeed, they should operate
‘as native’ in a digital context and therefore Staff Officers from the Defence Forces should be
able to execute MDMP via these networks and using those appropriate tools. Furthermore,
in order to gain the most benefit for troops, they should not just be ‘able’ they should excel.
Long and painful experience teaching these toolsets and networking shows that a huge benefit
occurs when highly trained staffs at these toolsets are working as they should with the correct
207
Generating Network Centric Warfare Capabilities
within the Defence Forces.
tools and technology. The training required is comparatively small to get this kind of benefit.
This can best be achieved within the Defence Forces by the formation of Centres of Excellence.
Much the same benefit can be had by troops on the ground. The main difference is that staffs
are normally located in Formation Headquarters, or tactical operations centres (TOCs), while
troops are normally located in vehicles, ships or aircraft. The networks and tools themselves
are normally heavily integrated with the vehicle – for example some platforms can pick up and
relay turret positioning from Armoured Fighting Vehicles (AFVs) - in addition the vehicles are
nearly always highly mobile. This produces a much greater training requirement as the soldier
must be able to keep their vehicle and integrated communication network running, AND learn
how to do TLPP (Troop Leadership) on the ground using these robustly networked systems and
tools. Much of this can be dealt with by the establishment of digital ranges within a Centre
of Excellence framework but the proper exercise of vehicles requires practice in the field with
individual and collective training to properly learn to fight the formation.
The next part of the training need is that for the communications soldiers, both in the planning
and in the operation of the networks. Paradoxically, this is usually easier, as they are normally
the introducers of the networks and applications. However, they do need the collective training
in high-tempo operations, as the very nature of combat means tools need support, and systems
need repair, and the practice in doing this is vital, as is establishment of communications. One
important point to make is that it is NOT the responsibility of the communications soldiers
to operate these systems – as mentioned above this is the responsibility of the staff and troops
on the Ground.
The next point to be addressed is that of the Applications themselves that are used for
Information Sharing and Situational Awareness. Historically, militaries paid software vendors
very large amounts of money to deliver custom solutions to address the needs of the military
at that point in time. However, this ran into problems almost from the start because the
computers available evolved rapidly as did the capability of the vehicles in which the hardware
was carried. In addition, military capability (for example, precision strike capability and UAVs
to take just a couple of examples, arrived in modern warfare, as did the need to operate in loose
coalitions of nations. These reasons, coupled with a lack of detailed requirements and little
headroom in the systems to expand to meet these needs, resulted in the delivery of systems
typically years overdue and obsolete or with very limited capability almost at delivery military at
that time. The net result was a huge mistrust of custom applications to deliver network centric
warfare capabilities.
Therefore, the current approach is not to use custom applications, but instead to use Commercial
Off The Shelf (COTS) applications to generate Network Centric Warfare capabilities. Advances
in standards, security, and enhancements to the products which benefit all, can be easily taken
on by installing the latest version. The Irish Defence Forces have settled on using the Sitaware
family of products, from the Danish company Systematic.
These products are used in the Staff Roles “Sitaware Headquarters” and in the Vehicle
“Sitaware Frontline” and on the commander on the ground “Sitaware Edge (on a battle vest)”.
This is the same product used by a number of military establishments. The US Army uses
Sitaware Headquarters in its new Command Post of the Future programme (CPOF), where
208
Generating Network Centric Warfare Capabilities
within the Defence Forces.
it is known as the Command Post Computing Environment (CPCE). Similarly, the US Army
are planning on the use of Frontline in the Vehicle Role where it is known as the Mounted
Computing Environment (MCE).
The Sitaware product suite is, at its, heart, dedicated to enabling Mission Command and
Network Centric Warfare. It does this via enabling information be shared, received and
transmitted via Compliance with a large and diverse set of technical standards and protocols
- for example VMF, MIP, JREAP, LINK16, ACO, NATO STANAGs. This ensures that it can
talk to other nations in the air, sea, and land domains. In addition, it provides Blue Force
Tracking display capability, integrating friendly force tracking for both air, sea, vehicle and
individual soldiers. It also provides chat message capability, which is fast becoming the
preferred communication method in modern Command and Control systems. In addition,
detailed Military planning tools to enable the military decision-making process (a standard
process, usually just called MDMP) are available to enable doctrine-led operations planning. It
enables a Common Operating Picture via advanced mapping and GIS capability, and NATO
standard symbology.
One vital part to note is that it – importantly – is able to work with the concept of resilience.
Any military network can and will get disrupted – importantly with Sitaware, if networks are
disrupted messages will reroute or hold until they can be delivered, thus making the network
self-healing, and validating the PACE concept (having alternate means of communication) so
vital to the operation of network centric warfare. In addition, networks may be disrupted by
radio silence for operational reasons – in these cases, again, the network will automatically
heal itself once radio contact is re-established. The network can also cope with bandwidth
limitations – for example the SINCGAR radio has extremely limited bandwidth compared to
3G/4G networks, but can be used by Sitaware by prioritising traffic.
It has been shown above that robust networking and enabling information sharing can strongly
improve effectiveness – these are the keys that enable Network Centric Warfare. The Naval
Service, in its creation of the Recognised Maritime Picture (the first uses of Sitaware in the
Defence Forces), has led the way in the Defence Forces and now it is the turn of the other
arms of the Defence Forces. As discussed above, the doctrine, training and equipment must
be in place to gain the benefits of Network Centric warfare. Other nations farther along the
transformation process have formed, based Centres of Excellence to enable the training of
the NCW approach and tools to end users and enable feedback to doctrine. This can happen
immediately and at relatively little cost and without waiting for expensive technologies. The
creation of Centres of Excellence, designed to provide the Defence Forces with the necessary
capabilities to empower the future force is a critical first step to a broader and more effective
application of these cutting-edge principles. In addition, for example, other technical advances
may be possible – as the openness of the tools make it straightforward to plug in such current-
generation approaches like Machine Learning or Artificial intelligence. Within the context of
the Defence Forces and their participation in coalition operations, the benefits to be gained are
clear and the embrace of Network Centric Warfare something that should happen fully across
all the arms of the Force
209
Generating Network Centric Warfare Capabilities
within the Defence Forces.
210
ABSTRACTS
1st Joint Command and Staff
Course
MA In Leadership, Management
And Defence Studies (LMDS).
ABSTRACTS · 1st Joint Command and Staff Course
This thesis examined an internationally recognised programme carried out by the Irish Defence
Forces (DF) between 2012 and 2016. This programme was aimed at improving Information
and Knowledge Management (IKM) across the organisation. A Return On Expectations
(ROE) methodology was selected as the most suitable assessment methodology in this instance
(Kirkpatrick and Kirkpatrick, 2010). A multi-methodological approach was used for conducting
this assessment across multiple stakeholder groups. Semi-structured interviews were conducted
with senior leadership of the DF who were key stakeholders in this programme. These were
compared and contrasted against a survey conducted with 130 respondents. The use of a case
study further strengthened the validity of this research. This was supported by the introduction
of an international perspective from interviews with eight experts in the field. These results
were measured against the original objectives of the IKM programme and the standards set out
in the new International Standards Organisation (ISO) global knowledge management system
standard: ISO 3041. The analysis revealed that while the programme was successful in the early
stages, there are clear capability gaps. These gaps challenge the IKM programme’s resilience and
its continued viability. Key recommendations were made, which are internationally relevant.
212
ABSTRACTS · 1st Joint Command and Staff Course
In today’s world stress is omnipresent. While personnel across the Irish Defence Forces
understand that stress exists, their ability to deal with it is self-taught and superficial in terms
of understanding its causes and what can help to ameliorate stress.
The Job Demands Resources (JD-R) Model is an occupational stress model that sets job
demands against job resources. Job demands are those aspects of the job that require sustained
physical and/ or psychological effort and are associated with physiological and/ or psychological
costs. Job resources are those aspects of the job that reduce job demands and the associated
physiological and psychological costs.
The research showed that service in the Irish Defence Forces is stressful and that the
organisations understanding of stress is limited. While serving personnel accept this, their
ability to deal with stress is self- taught and based on the need to get ‘space’ by carrying out
recreational activities. While the model was introduced to research participants summarily,
they all acknowledged its relevance and suitability.
The findings demonstrate the need for a better understanding of stress in the Irish Defence
Forces. It is also recommended that the Job Demands- Resources model is adopted as the
occupational stress model of choice across the Defence Forces to better understand job
demands and resources.
213
ABSTRACTS · 1st Joint Command and Staff Course
British MOD (2018) have stated “that information is no longer just and enabler, it is a fully-
fledged national level of power, a critical enabler to understanding, decision making and
tempo, and a weapon to be used from strategic to tactical level for advantage”. The significance
of this evidence indicates that the Irish Defence Forces cannot operate in a vacuum when it
comes to the threats posed by hybrid warfare in the information domain.
The literature highlights the growing weaponisation of the internet and its application by non-
state actors to conduct hybrid warfare in the information environment. The application of
these hybrid methods by ISIS and Al-Shabaab have demonstrated the significant capabilities
provided by the internet as a platform to manipulate perception and radicalise followers. This
thesis explores these challenges and investigates the methods employed by nation states to
counter these hybrid threats.
The research of this thesis adopted a qualitative phenomenological research methodology,
utilising a combination of semi-structured interviews and case studies. As part of this process,
experienced DF personnel were consulted to provide an organisational perspective and subject
matter experts from outside the organisation provided an in-depth look at the global challenges
at the strategic level.
The research indicates the substantial security risks that exist in the information domain
to the force protection of DF soldiers serving overseas. The key findings proposes that the
platform provided by social media permits non-sate actors to express or exploit anger setting
off additional torrents of rage. Recommendations from this study determine that the DF needs
the capability to decipher reality from perception in the information domain particularly in the
context of an overseas deployment
214
ABSTRACTS · 1st Joint Command and Staff Course
“Never write if you can speak; never speak if you can nod; never nod if you can wink” is a quote
attributed to attributed to an old New York Democratic boss (Smyth, 2003, p. 86).
In a modern democracy where openness and transparency is rightly expected, a military
organisation must find the balance between its responsibilities for security and its obligations
to the institutions of civil society. This thesis sets out to explore how manager behaviour in the
Irish Defence Forces has been effected by the enactment of the Freedom of Information Act
2014 and the perceptions of senior military staff around those impacts.
The research adopted a post-positivist qualitative methodology and phenomenological
perspective and utilised a combination of a case study, a focus group, and semi-structured
interviews with senior executives of the Irish Defence Forces.
The research results indicated that a culture of openness, an increase in transparency, and an
increase in accountability have resulted from the enactment of the Freedom of Information Act
2014 in the Irish Defence Forces. The results also indicate that, after initial wariness around
Freedom of Information within the military context, military management are positively
disposed to the impacts that the Freedom of Information Act produced.
This thesis concludes that the culture of openness, the increase in transparency, and the increase
in accountability have led to better decision making and an increased level of trust with both
external and internal audiences. Finally, a number of recommendations were reached which
include the release of routine military processes that would negate the necessity for Freedom
of Information requests, targeted rank-appropriate education in the Freedom of Information
area, specialised training in the area of ‘big-data’ and the consideration of.
215
ABSTRACTS · 1st Joint Command and Staff Course
This thesis aims to answer the central research question: is the Defence Forces’ learning
environment supporting the needs of its learners? A theoretical framework based on the three
components of places, spaces, and pedagogies that comprise the military learning environment
is employed to guide this inquiry. This research is informed by workplace learning theory,
learning spaces design, and adult learning theory.
A mixed methods approach was adopted for this research. Initially, data was collected through
documentary analysis of key Defence Forces’ education policy documents. This was followed by
the creation of a ‘military learning environment survey’ using ‘Survey Monkey’ to assess military
learner’s perceptions of the military learning environment. The survey was administered to
members of the current Junior Command and Staff Course and Joint Command and Staff
Course at the Military College. The final stage of data collection was the conduct of semi-
structured elite interviews with strategic leaders responsible for officer education in the
Defence Forces.
Analysis of Defence Forces education policies highlight the value placed upon education by
the Defence Forces, however, some difficulties with delivering on the ambitions for education
have emerged. These include inadequate funding; the absence of a coordinated Capability
Development Plan with a supporting Infrastructure Development Plan, and the dilution of
infrastructure responsibilities across directorates and command boundaries. Results from
the survey indicate that learners are motivated to learn so they qualify for promotion and
also to enhance their professional knowledge. Barriers to learning in the military workplace
include inadequate time to complete tasks, heavy course workloads, and learning infrastructure
problems. Findings also point to widespread dissatisfaction with the infrastructure of the Military
College, accommodation facilities, learning facilities, and internet connectivity. Facilitators of
learning include teaching quality, the Military College link to Maynooth University, and peer
knowledge and experience sharing.
It can be inferred from these results that military learners have similar pedagogic and proxemic
needs to other adult learners. Military learners also experience similar barriers and enablers
of learning to other workplace learners, confirming that workplace learning theory is a useful
theoretical lens for understanding learning in the military workplace.
216
ABSTRACTS · 1st Joint Command and Staff Course
This thesis seeks to explore whether resilience engineering theory can be used in practice
to improve resilient performance (including safety performance) in complex sociotechnical
systems. In order to answer the question, the practical application of the theory was applied
to a real complex sociotechnical system, namely the Irish Air Corps’ Emergency Aeromedical
Service. The research addresses a gap in academic literature within the field of organisational
resilience, in that to date no research has been conducted into the practical application of
resilience engineering’s recently developed Resilience Analysis Grid (RAG) model in an
organisation that engages in complex flying operations.
The study required a background understanding of psychological and ecological resilience
theory in order to develop a sufficiently deep understanding of the existing theories that led to
resilience engineering. Resilience engineering emerged in response to the lack of satisfactory
performance of traditional safety management systems over the last three decades, especially in
professional aviation organisations. It aims to use the knowledge that has already been gained
through psychology and ecology and apply it to sociotechnical systems.
The theory proposes that successfully performing sociotechnical systems must be able to
monitor the critical, respond to the actual, anticipate the potential, and learn from the factual.
The RAG model, on which this theory is based, was created to assist in the practical assessment
of organisational resilience and to identify where improvements in resilient performance could
be made. An adapted form of this model was therefore used to assess organisational resilience
in the Air Corps’ EAS operation, and identify where improvement interventions could
be made.
A pragmatic mixed-methods iterative approach was adapted through the use of focus groups and
semi-structured interviews, with the quantitative element providing the basis for the graphic
presentation of results, and the qualitative element providing the basis for a rich understanding
of the problems encountered within the system and therefore allowing the opportunity to
propose effective and valuable interventions for improvement.
Following data collection and analysis, it was found that the EAS operation performs reasonably
well in the system’s ability to monitor and respond, but considerable effort is required to
improve resilient performance with respect to learning and anticipation. These improvements
would create conditions for improved performance (including safety performance) and would
ultimately result in the Air Corps providing greater safety for crews, improved patient care, a
more efficient operation and the confidence to be prepared for the unexpected. The study
demonstrated that resilience engineering theory can be used to assess organisational resilience
in a complex sociotechnical system, and identify where improvements to resilient performance
could be targeted.
217
ABSTRACTS · 1st Joint Command and Staff Course
The 2011 NATO-led intervention into Libya was predicated under a protection of civilians
mandate and was the first instance of the UNSC authorising intervention into a nation
without that nation’s consent. Libya therefore, affords an opportunity to further the debate on
the subject of both humanitarian intervention and the protection of civilians. Moreover, Libya
offers a contextual platform from which to analyse the development of NATO’s protection of
civilians (POC) framework and may help determine the efficacy and practicality of the POC
policy or indeed of intervention for humanitarian purposes itself. As primarily a defence
alliance, with its raison d'être being the principle of collective defence, NATO has demonstrated
its willingness to conduct humanitarian interventions in order to protect civilians. However,
the current instability in Libya since the 2011 NATO-led intervention and the subsequent
second order effects of that intervention give cause to question the efficacy of the intervention.
These second-order effects include but are not limited to, lack of central government control,
ongoing violations of human rights and the proliferation of armed groups, in particular the rise
of Islamic State in parts of Libya. This has also had the consequence of contributing to regional
instability through spill over from Libya into Mali and Egypt.
At the 2016 NATO summit in Warsaw, NATO nations endorsed a specific POC policy, with
its stated aim being to “instil a coherent, consistent and integrated approach to POC” (NATO
2016: 2). Can NATO’s POC policy be operationalised to ensure that humanitarian intervention
remains impartial and that a post-intervention Libya does not reoccur in the future? Moreover,
against this background, can genuine humanitarian intervention be separated from the politics
of national interest? The aim of this thesis is to examine NATO’s POC policy in the context of
the broader interpretation of POC and to determine if NATO is best suited to carry forward
the developing political and normative assumptions of POC. It additionally evaluates the
efficacy of NATO as an intervening agent on behalf of the UN and assesses the effect that the
Libyan intervention has had on the development of the POC policy endorsed at NATO’s 2016
Warsaw Summit.
The findings from this research suggest that NATO’s POC policy itself provides nothing new
and presents no further obligation to its members. As such, the policy in essence represents the
bringing together of all current POC obligations of NATO nations under one policy document.
Additional findings indicate that the separation of humanitarian intervention and national
interest is nigh impossible and that although NATO is in itself not an altruistic organisation,
it nonetheless may represent the only response option in instances of grave violations of
human rights.
218
ABSTRACTS · 1st Joint Command and Staff Course
Irish Defence Force officers will find themselves negotiating in conflict regions, between
warring parties, on complex issues, where an alternative to peace is possible injury or loss
of life. At all levels, Irish officers should be fully prepared to navigate any negotiation
process successfully.
In order to identify shortcomings in the area of negotiation training, this study explores how the
Irish Defence Forces train and develop the negotiation skills of its officers. It further examines
avenues for professional development and competency to ensure our officers are fully prepared
to negotiate effectively at home and more specifically, overseas.
A qualitative phenomenological study was accompanied by interviewing serving and retired
officers who were centrally involved in overseas negotiations at varying levels. Their knowledge
and experiences provided a rich description of the challenges they faced negotiating overseas
and the training, or lack of, they received in preparation for such appointments. Content
analysis revealed a close alignment with the literature reviewed and the research findings.
The research findings indicate that current negotiation training in the Irish Defence Forces
is not adequate. It is further posited that due to our innate ability to interact and adapt with
people and situations when required, negotiation training in the Irish Defence Forces has
never received the focus it necessitates and therefore should become part of Defence Force
formal training.
In light of these findings, a number of conclusions and recommendations are made. This
thesis proposes the requirement for a modularised crisis negotiation course, for officers serving
overseas in appointments that necessitate negotiation, and should be conducted in the pre-
deployment phase of training. It further describes a model for crisis negotiation training, which
is recommended for officer education within the Defence Forces. The adoption of such a
model will meet the Defence Forces requirement to advance our current knowledge and skills
in negotiations.
219
ABSTRACTS · 1st Joint Command and Staff Course
This thesis examines the nature of innovation by irregular forces such as terrorists and insurgents
in order to address the following questions: 1. What drives and/or enables innovation for
irregular forces? and 2. What are the most appropriate responses by conventional forces when
faced with disruptive innovation from irregular forces?
In addition to examining scholarly work in the defence and security field, this work also draws
on sources from the fields of business management, public policy and sociology in order to gain
as holistic a view of the phenomenon as possible. The research took the form of semi-structured
interviews with subject matter experts both with Counter IED experience and specialist
knowledge on innovation. The relevance to the Defence Forces, as a whole, is that a better
understanding of such innovations could lead to improvements in how we approach C-IED.
The key findings of the study on the question of innovation by irregular forces are that it is
driven by many factors from cost, emulation, practicality and overcoming countermeasures.
These factors additionally are influenced by a group’s relationship with other groups and the
nature of the environment in which the irregular force can operate.
Concerning the response by conventional forces, it is found that the employment of certain
types of technological countermeasures and proactive measures against threat networks are
limited in their effectiveness. Great value can be extracted from improved tactics techniques
and procedures. The effect of organisational culture for a conventional force is significant and
the degree of inertia that is inherent in large organisations is clearly an obstacle which needs
to be addressed.
220
ABSTRACTS · 1st Joint Command and Staff Course
As Ireland's economy approaches full employment, the rate of youth unemployment is well
above the levels during the height of the Celtic Tiger. The Defence Forces Employment
Support Scheme aims to provide participants between the ages of 18-24, with the knowledge
and skills that will enhance their capacity to pursue employment, work experience or further
educational opportunities.
The aim of this research was to review the Defence Forces Employment Support Scheme from a
social impact perspective, as outlined in the White Paper on Defence (2015). In conducting the
research, the relevant literature was reviewed in detail, along with qualitative analysis involving
a number of key individuals who have been instrumental in developing and overseeing the
scheme since its inception.
The key findings of this research were that the scheme has a positive social impact. All of
the research participants spoke highly of their involvement with the scheme. An unexpected
finding related to the positive effect, which the scheme has had for the Defence Forces. This is
positive in an era where the Defence Forces can struggle to justify its relevance.
In conclusion, the Defence Forces Employment Support Scheme is a success. Further study
may be required to evaluate the progress of the participants after the completion of the course
in order to fully assess if they are in full employment, education or on the live register.
221
ABSTRACTS · 1st Joint Command and Staff Course
Procurement is a critical function for any large modern organisation. Many large modern
organisations, with a wide globally-distributed structure, function optimally under centre-led
procurement as they can take advantage of a number of factors that enhance efficiency. The aim
of this research was to elicit consensus of expert opinion on the current state of procurement
within the Defence Forces, how it might be improved, whether centre-led procurement would
improve procurement efficiency and effectiveness, whether there was any appetite for change
at the senior management level and to what extent change to centre led procurement was
desirable or feasible for senior management in the Defence Forces.
Semi-structured interviews were carried out in order to ascertain the data in a qualitative
approach. Four interviews were carried out with experts within the Defence Forces and the
Department of Defence at the senior management level and one with a senior representative
of the Office of Government Procurement, to provide an external unbiased perspective.
Each interview was prefaced by the provision of a case study on centre led procurement to
contextualise the area of research. Interviews were recorded and transcribed, and thematic
coding used to identify recurring themes.
The results showed a significant degree of consensus from interviewees within the Defence
Forces/Department of Defence in that there was no requirement or utility for change, except
in special cases, as procurement was currently working well. The Office of Government
Procurement interviewee demurred, expressing the need to constantly refine process and
practice to maximise efficiency and effectiveness.
Challenges such as the cash accounting system and lack of multi-annual budgets were identified
as significant impediments, in addition to skills fade due to the constant turnover of personnel
and the unique nature of military service. There was a large variation in the appetite for
change. Ultimately, centre led procurement was recognised as the way ahead with regards to
complex and bespoke procurement, but there was no clear vision or roadmap identified by
senior management as to how it should be achieved.
This thesis identified a natural tension between the need for compliance and the need for
innovation and evolution of processes and practices. This should provide a platform for
future research into the harmonisation of both approaches to exploit the positives from
each viewpoint.
222
ABSTRACTS · 1st Joint Command and Staff Course
Becoming a mother is a life altering experience on its own. When women who serve in the
military become mothers for the first time their cover as conceptual men is broken. Motherhood
ultimately alters the playing field.
The review of the literature focused on the institutions of work and family and examined
the intersection between these two opposing arenas. Both institutions have been termed
“greedy” within the literature. Role conflict emerged as a theme in two guises, first as a result
of involvement in two competing systems and second from having a range of competing duties
to perform. One of the major obstacles put forward for women in pursuing a career is that
of balancing the new roles associated with motherhood and their previous existing work
related roles. The literature points to the construct of masculinity as an emergent theme when
considering women in an organisation such as the Defence Forces where they are a minority
grouping. The literature also ranks organisations maturity in respect of work life balance
polices and supports provided to women and the perception of these supports within both the
organisation and by the recipients of these supports.
The research employed a post-positivist, qualitative research methodology utilising semi-
structured interviews with senior HR managers both internal and external to the Defence
Forces. Focus groups with participants drawn from all three services, Army, Air Corps and
Naval Service and including both commissioned and non-commissioned officers were also
exploited. This provided a broad range of views. The unique experiences of women as mothers
and soldiers was captured.
This study confirmed that women re-evaluate their future careers when children arrive and based
on current requirements for career progression within the Defence Forces are self-selecting not
to progress. It also confirmed that the current career obstacles for many to overcome require a
clear choice between family and work. This research drew attention to the fact that women are
disadvantaged by common practices of performance appraisal when absent for maternity leave.
This research has also demonstrated that women are highly committed to the Defence Forces
and deeply appreciated of the statutory entitlements they receive.
In conclusion for the Defence Forces to recruit, retain, promote and increase the number of
women within the organisation it is essential that it acknowledges that the current practices do
not fit with the way women work. Failure to do so will continue to result in a loss of capability
which the Defence Forces cannot afford.
223
ABSTRACTS · 1st Joint Command and Staff Course
Ireland’s climate is changing in terms of sea level rise, increases in average temperature, changes
in precipitation patterns and weather extremes. The observed scale and rate of change is
consistent with European and global trends. The Irish Defence Forces has been requested by
local authorities throughout the country to supply defence aid for every adverse weather event
since 2010. Notwithstanding supplying defence aid, defence infrastructure is experiencing
the effects of climate change during these extreme weather events with increased demand for
heating and cooling of buildings. This is similar to what other militaries experienced and who
have since developed adaptation plans for climate change. This difference between the Irish
Defence Forces and other militaries who have developed adaptation plans for climate change
is that they were legislated to do so by their government.
This research found that there is a level of concern for the impact of climate change by
Government, Department of Defence and Defence Forces. The Government are producing
the All Government Climate Action Plan, the publication of which keeps being postponed.
The Department of Defence had input into this document, yet the Defence Forces say they did
not. Production of after-action review of aid to the civil authority callouts for extreme weather
events vary but where produced they consistently fault equipment available to use and the
suitability of military equipment for civilian use.
While the Government, Department of Defence and the Defence Forces are interested in
addressing climate change they have not come together to address the issues being faced. It
is therefore essential that the Defence Forces develop an adaptation plan to climate change
with the support of Department of Defence and Government to have a unified approach to
becoming climate resilient.
224
ABSTRACTS · 1st Joint Command and Staff Course
Is the Command Structure of the Defence Forces Fit for Purpose? This thesis examines the
Command Structure of the Defence Forces and whether it is fit for purpose. The history of the
Command Structure of Óglaigh na hÉirean is examined in detail in order to establish why the
Defence Forces has the command structure it currently has, if it is suitable or are there more
suitable options available.
It explores the militaries of several other nations who are in the process of changing or have
already changed their Command Structures in response to the evolving security and defence
arena as well as changing strategic threats. It contrasts that which caused these other nations
to change their C2 against the unchanging structure of the Defence Forces. The thesis also
explores various change theories, asks what the best change model for the Irish Defence Forces
would be and how the Defence Forces could change were the political will to do so present.
The study revealed several findings including the fact that Jointness, in some form at the
strategic level at least, may be a solution to command and control issues bearing in mind that
the small scale of the Defence Forces makes this difficult to achieve. The subject matter experts
interviewed in Chapter Four all agree that the Command Structure needs to change to some
extent or another. It also became apparent that the Chief of Staff needs more autonomy, both
from a legal and command perspective.
As a result of these findings a number of recommendations were made including changes to
the establishment of the Defence Forces, the introduction of Jointness in some form tailored
specifically for Irish military tasking’s, the need for new branches such as cyber- warfare to deal
with evolving strategic threats and the creation of a land component commander.
225
ABSTRACTS · 1st Joint Command and Staff Course
The aim of this research is to examine the national approach to emergency preparedness and
to determine how prepared Ireland is for an emergency that would require the activation
of the National Emergency Coordination Group. The research applies the Clark and Estes’
(2008) Gap Analysis Model to identify the existence and causes of the gaps in national
emergency preparedness.
The research first establishes the national high-level goals for emergency preparedness
and through document analysis and interviews attempts to define the current levels of
preparedness. Then by applying the Gap Analysis Model, the research examines three areas,
namely Knowledge, Motivation, and Organisation, to determine the root causes of the gaps. By
then comparing the gaps to the desired end state, a road map to a better level of preparedness
is proposed.
Through this research I have found that Ireland is moving towards improved preparedness for
national level emergencies. Policy and guidance documents exist, and key individuals recognise
the need for a developed emergency management system. However, gaps also exist and will
need coordination and collaboration amongst all members of the Government Task Force
for Emergency Planning along with leadership and guidance from the Lead Government
Departments and the Office of Emergency Planning if those gaps are to be resolved.
226
ABSTRACTS · 1st Joint Command and Staff Course
The thesis will examine the Irish DF’s approach to contemporary CIMIC operations in UNIFIL.
The question that provides direction for this thesis is: Is the DF developing the necessary capability
to meet the operational requirements of its UN CIMIC roles? Essentially, this research examines how
the DF selects and trains personnel for this operational task to ensure the organisation can
meet the UN’s requirements.
Selection for overseas service is generally conducted in a structured way within the Defence
Forces to ensure a fair system is available to all personnel. This research examines whether
there is a link between individuals selected for operational roles overseas and the suitability of
such individuals.
Pre-deployment training of personnel selected for tactical CIMIC appointments in UNIFIL
is the main focus of the research. International military best practice is considered, as well as
published literature regarding areas of importance for pre-deployment training. In particular,
training in cultural awareness, negotiation and language skills is examined to establish what
level of training in these softer military skills is available to military personnel, pre and
post-deployment.
Interviews conducted with the selection and training authorities within the DF reveal how
the organisation deals with these areas. Focused semi-structured interviews with officers with
a combined total of five years’ experience in tactical CIMIC appointments in UNIFIL provide
detail of the lack of formal training in these skills. However, the Irish DF still manage to meet
all operational requirements assigned by the UN.
There is no doubt that the Irish DF is meeting the operational requirements of its UN CIMIC
tasks, but it may be doing so by consequence of its soldiers’ collective attitudes and behaviour,
rather than by design. The empathetic nature of Irish soldiers and their ability to apply an ‘Irish
approach’ to any and all scenarios they encounter during deployment positively influences the
attitude of the local population towards the deployed force. The intricacies of peace-keeping
appear to come naturally to Irish soldiers.
227
ABSTRACTS · 1st Joint Command and Staff Course
This thesis examines if the motivational climate in the Cadet School of the Irish Defence Forces
facilitates individuals to reach their physical fitness potential. It examines specifically the impact
of organisational climate and outlines the current understanding of how climate influences
motivation. The conceptual framework draws from the existent literature in organisational
climate, motivation, sensemaking, social comparison and goal setting and situates these in the
context of inductees in this military training environment.
A mixed methods research approach was employed. This comprised of questionnaires, previous
fitness test results, focus groups and semi-structured interviews with both newly commissioned
officers and cadets, and key influencers in the Cadet School. The key findings indicate that
section commanders, platoon sergeants and platoon commanders are the main architects of
climate within the Cadet School. Climate plays a significant role in restricting certain cadets
from achieving their full physical training potential, and this has knock-on effect on the other
areas of their training. The findings also indicated a gendered nature to this phenomenon.
A physical training regime that incorporates a realistically high level of personal challenge
and which also includes the possibility of both ability-based individual and group elements of
physical training increases motivation to succeed. Approaches to the recognition of injury on
the part of key influencers have serious implications for psychological well-being for feelings of
efficacy in relation to other areas of cadet preparation.
Recommendations include a comprehensive approach to human performance, development
of an educational framework for both staff and students and a physical training environment
centred on a team-based military ethos incorporating individual and group-based goals.
228
ABSTRACTS · 1st Joint Command and Staff Course
As soldiers, it is expected that we will be placed, at times, in harm’s way. We do after all
deploy soldiers to assist our public services in on-island operations, including tasks such as
flood relief and firefighting. We conduct live fire training exercises and deploy our soldiers on
overseas missions suffering injury and loss of life. This aim of this research is to determine best
practice when assessing risks and their application to Force Protection measures adopted on
UN missions from an Irish military perspective.
Combining semi-structured interviews of highly competent individuals with some pre-existing
textual data, the study found that many factors at the tactical, operational and strategic level
influence a mission’s, country’s or an individual’s appreciation and application of force
protection. The adoption of a Force Protection doctrine and its implementation will mitigate
those risks which soldiers can be subjected to on overseas missions to as low as is reasonably
possible while also fulfilling the mission those troops were sent to achieve.
The main findings of this study are that NATO Force Protection doctrine is the best approach
to Force Protection and should be implemented and espoused by the Irish Defence Forces on-
island and overseas. National and individual approaches to force protection significantly affect
a mission’s approach to force protection. In general, culture changes slowly, with the possible
exception being shocks to systems which can generate a more rapid rate of change. Ireland’s
significant contribution to peacekeeping can be further enhanced by being a positive influence
for change in the area of force protection and the safety of all soldiers on overseas missions.
229
ABSTRACTS · 1st Joint Command and Staff Course
Ireland, as an island nation, is heavily dependent on the seas for social, political and economic
deliverables and requires that this maritime domain is secure for its survivability. Despite this
requirement for security, Ireland has not developed a maritime security strategy.
The aim of this thesis is to make a case for Ireland to adopt a national maritime security strategy
as the literature review highlighted that island nations with a heavy dependency on the oceans
should implement a maritime security strategy. The literature review also highlighted that the
creation of a maritime security strategy can be utilised to define the maritime governance of a
state and that the methods to complete this requirements requires states to conduct maritime
security sector reform.
This research adopted a qualitative research design with a social constructivist approach. Data
was collected utilizing a focus group to form the questions for the conduct of semi-structured
interviews of the senior command of the Naval Service and of a leading Irish academic expert.
The findings of this research indicate that a maritime security strategy is required as it would
resolve the current siloed approach in Ireland towards maritime national security. This is due
to the disperse allocation of maritime responsibility across all government departments that
has no central coordinator with authority. The findings of the research further reflect that a
maritime security strategy is a key enabler to economic development of the maritime sector,
however, maritime sector reform is required.
The key finding of this research is that a case does exist for Ireland to adopt a maritime
security strategy.
230
ABSTRACTS · 1st Joint Command and Staff Course
Irish Government policy expresses the intent that the Defence Forces should operate ‘Jointly’,
that is to deliver effects in a coordinated and cohesive manner. Building on previous research,
the aim of this study is to identify, analysis and ultimately recommend what model of ‘Jointness’
is best suited for application within the Defence Forces.
As part of this analysis, it is important to take cognizance of the prevailing cultures within
the component services that constitute the Defence Forces and how such cultures will impact
upon the transition to achieving joint effects, with particular emphasis upon the level of
understanding that exists within the Defence Forces as to a ‘Joint’ concept and the application
of various levels and models of joint organizational structures that can be employed.
This study initially examines a broad swathe of academic literature, determining that although
a significant proportion of this literature is focused upon the implications of Joint structural
dynamics in larger, more kinetic, military structures, there exists utility in its employment in
the context of establishing an analysis of Jointness within the Irish context.
This study also adopts a Realist, Post-Positive ethnographic approach to examine the individual
service culture, the overall organisation Defence Forces culture, and how they interact in the
context of organisational change.
Findings from this research indicate that the Defence Forces has developed to become
increasingly Joint and that a broad, yet diverse, understanding of the utility of a joint concept
exists. Findings also determine that the organisational cultural dynamics have reduced in
severity, despite the existence of cultural barriers.
This shift in the cultural organisational dynamic provides a window of opportunity for the
Defence Forces to further develop a Joint concept; however, the window of opportunity is
finite and may close if the Defence Forces does not take advantage of its current position.
231
ABSTRACTS · 1st Joint Command and Staff Course
After the end of the Cold War NATO’s old adversary, the Soviet Union had fallen apart and
its successor, Russia, sank into insignificance. NATO faced other conflicts and concentrated its
efforts on fighting international terrorism and other threats for the international community.
But fighting insurgents and terrorists worldwide influenced NATO Forces on both sides of the
Atlantic Ocean, in their structure as well as in their ideology and mindset. In Europe, former
Warsaw Pact members decided to join NATO and took shelter under the umbrella of NATO.
Consequently, military forces were adjusted to the new security environment and were reduced
dramatically throughout Europe.
With NATO expanding its area of responsibility to the East, Russian sphere of influence has
been decreased and Russia expressed – more than once – its unwillingness to accept this new
situation of being surrounded by its previous enemy. In March 2014 the Russian bear roared
again and reminded Europe that the old and well-known adversary of the west is back on
stage. The Chief of the Russian General Staff, General Waleri Gerasimov used a new strategic
concept of expanding Russian influence through all possible means. This approach was later
described as the so-called “Gerasimov Doctrine” and illustrated the idea of hybrid warfare.
Acknowledging the problematic history of the German – Russian relations, this thesis describes
the development of the German Army, after Russian illegal annexation of the Crimean
Peninsula and its aggression in Eastern Ukraine. It assesses the development of NATO towards
a higher status of readiness and responsiveness and describes the political framework in which
German forces are set.
This thesis is aimed to provide an impression of the capabilities modern Land Forces must
provide to withstand a hybrid adversary on a more and more digitalised battlefield. They are
derived from the lessons learned from current conflicts, a possible path of development for the
German Army described, as well as several individual actions are recommended.
232
ABSTRACTS · 1st Joint Command and Staff Course
The US Army is a global network that would not be effective without a good logistics network.
A good logistics network needs effective Logistics Officers to be effective. The purpose of
this research paper is to examine which leadership style is more effective, transformational or
transactional for US Army logistics officer.
This study aims to determine the effective leadership style for US Army Logistics Officers in
order to gain a better understanding of the current leadership styles used and when to use
them to be more effective. After analysing the current literature, the research revealed that
past studies used the Multi-factor Leadership Questionnaire (MLQ) as a basis for research, and
there is a gap in styles of leadership used in logistics. While the MLQ is a sound model, it does
not reveal the human aspects of leadership. Therefore, the study used a qualitative method of
research using authoritative knowledge, subjective epistemology, relativist ontology, naturalist
methodology and balanced axiology to conduct the research.
The study was conducted through semi-structured interviews analysed using reoccurring themes
by coding the data into smaller packets. Ultimately the study confirmed five characteristics of
an effective logistics officer in explaining the why, communication, building the team, trust,
and accomplishing tasks based in current literature.
The study revealed three factors in choosing which leadership styles is more effective based on
situation-based, position-based and environment-based. The findings of the study demonstrate
that further research is needed using qualitative methods and a larger sample to examine using
a blend of two leadership styles based on the three factors.
233
234
SHORT BIOGRAPHICAL
STATEMENTS OF
CONTRIBUTING AUTHORS
Dr. Donna O’Shea is Head of Department of Computer Science at Cork Institute of
Technology, Funded Investigator at the SFI research centres CONNECT and ENABLE and
group lead of Ríomh – Intelligent Secure Systems research group and member of Nimbus
Research Centre. Donna’s research expertise lies in the area of enterprise security (i.e. SDN
and NFV security) and network and service management with a specific focus on the design,
analysis and optimisation of wired and wireless communication systems, networks and services.
Dr. Mubashir Husain Rehmani received a B.Eng. Degree in computer systems engineering
from Mehran University of Engineering and Technology, Jamshoro, Pakistan, in 2004, the M.S.
degree from the University of Paris XI, Paris, France, in 2008, and the Ph.D. degree from the
University Pierre and Marie Curie, Paris, in 2011. He is currently working as Assistant Lecturer
in the Department of Computer Science, Cork Institute of Technology, Ireland. Prior to this,
he worked as Post Doctoral Researcher at the Telecommunications Software and Systems
Group (TSSG), Waterford Institute of Technology (WIT), Waterford, Ireland. He also served
for five years as an Assistant Professor at COMSATS Institute of Information Technology,
Wah Cantt., Pakistan. He is currently serving as an Area Editor of the IEEE Communications
Surveys and Tutorials. He is also serving as Column Editor for Book Reviews in IEEE
Communications Magazine.
Dr. Brendan Flynn is a lecturer at the School of Political Science and Sociology, NUI, Galway.
His current research interests include maritime security and defence and security studies more
broadly. He teaches European politics and Ocean and Marine politics and has lectured at
the Joint Senior Command and Staff Course. He was a co-editor of the 2018 Defence Forces
Review. Recent publications include: Flynn, Brendan (2019) “From hand-me-down navies to
niche players? Comparing the navies of (very) small European states”, pp. 51-70 in McCabe,
Robert, Deborah Sanders and Ian Speller (eds.) Europe, Small Navies and Maritime Security
Balancing Traditional Roles and Emergent Threats in the 21st Century. London: Routledge;
Flynn, Brendan (2018) 'PESCO and the Challenges of Multilateral Defence Cooperation for
Ireland: More of the Same or Sea Change?'. Irish Studies In International Affairs, 29 :1-23.
Jonathan Carroll, a graduate of Maynooth University with a Degree in Civil Law and
a Master's in Military History and Strategic Studies, is currently a PhD student in Military
History at Texas A&M University, a United States Senior Military College. Jonathan's research
focus is on military operations other than war (MOOTW). He is currently working on a project
examining the multinational military interventions in Somalia from 1992-1995. Previously,
Jonathan was an adjunct lecturer with the Center for Military History and Strategic Studies
at Maynooth University, providing academic instruction to Defence Forces cadets, potential-
officer, and officer progression career courses. Jonathan also served in the Army Reserve as
an NCO, and subsequently a commissioned officer, with units in Dublin, Athlone and the
Defence Forces Training Center
236
Capt Kevin Fitzgerald works as a helicopter pilot in No. 3 Operations Wing in the Air
Corps, and as a press and public relations officer. He has a background in aeromedical flying
and police flying, and works primarily as a flight instructor in the helicopter school. Kevin has
a particular interest in development of the Special Operations Forces rotary capability in the
Defence Forces.
Lt David Finnegan is a pilot with the Maritime Surveillance and Airlift Squadron of the Irish
Air Corps. He is also a founding member of the Defence Forces RPAS school who provide
education, training and flight safety information to all members of the organisation in all
matters pertaining to RPAS operations both at home and overseas
Dr. Daniel Fiott is Security and Defence Editor at the EU Institute for Security Studies
(EUISS). At the EUISS, Daniel analyses European defence policy, CSDP, defence capability
and industrial issues and hybrid threats. Daniel was educated at the University of Cambridge
and he holds a PhD from the Free University of Brussels (VUB). He is the author of
Defence Industrial Cooperation in the European Union: The State, the Firm and Europe
(Routledge, 2019).
Eoin Micheál McNamara is currently in the completing stages of a PhD in political science
at the University of Tartu in Estonia. His monograph is focused on NATO stabilisation strategy
in Afghanistan. Since 2013, McNamara has taught extensively at Tartu’s Johan Skytte Institute
of Political Studies, convening courses in: foreign policy analysis; transatlantic relations; EU
security policy; alliances in international politics; and power in international politics. His
research interests include: NATO transformation; comparative security policy in Central and
Eastern Europe; Nordic-Baltic security; and the strategies of war in the contemporary world.
McNamara’s academic and policy publications have appeared in the NATO Review, the Revue
Militaire Suisse, New Eastern Europe and Irish Studies in International Affairs, as well as
with research institutes including the Finnish Institute of International Affairs (Helsinki)
and the Foreign Policy Research Institute (Philadelphia). His commentary on security and
defence affairs has been quoted in many international media outlets; these include the New
York Times, the Irish Times and the Estonian Public Broadcasting Service (ERR). In July and
August 2019 he was awarded the Think Visegrád Fellowship at the Institute of International
237
Relations (IIR) in Prague, Czech Republic to undertake research on the Visegrád states and the
development of collective security along NATO’s ‘Eastern flank’. He holds an MSc in security
studies from University College London; an MA in European Union – Russia studies from the
University of Tartu; and a BA (Hons.) in history and politics from University College Dublin.
Comdt Gavin Egerton is a professional Army officer with 17 years’ service in the Infantry
Corps. He was commissioned in 2004 and commenced his career with 3 Infantry Battalion.
He later served in 1 Mechanised Infantry Company; 4 Infantry Battalion; 1 Brigade Training
Centre; Officer Training Wing, Infantry School; and Strategic Planning Branch, DFHQ. His
most recent appointment was as Officer-in-Charge and Chief Instructor of the NCO Training
Wing, Infantry School. He has served overseas on three previous occasions: as a CIMIC officer
with 101 Infantry Battalion MINURCAT, as Company 2IC with 108 Infantry Battalion UNIFIL,
and as battalion operations officer with 110 Infantry Battalion UNIFIL. Comdt Egerton holds
a Bachelor of Business degree from GMIT; a Higher Diploma in Leadership, Defence, and
Contemporary Security from Maynooth University; as well as a first class honours Master’s
degree in Political Communication from Dublin City University. He is currently deployed to
EUTM Mali where he is serving as the Deputy Chief Instructor in the Education and Training
Task Force.
Dr. David Reindorp is a member of Vedette Consulting Limited’s Battle Staff Coaching
Cadre. He is currently working with the UK’s 2* Maritime Battlestaff and Standing Joint
Force HQ as they develop the decision making skills and processes necessary for warfighting in
today’s uncertain and ambiguous operating environment. David has a PhD in Strategic Studies
and an MPhil in International Relations. In a previous career he commanded warships for the
Royal Navy and developed military and defence strategy for the MOD.
Pte (AR) Eoin O'Shea serves as a reservist in 7 Inf Bn but is currently seconded to the PSS for
research taskings. His civilian professional career involves working as a counselling psychologist
and CBT therapist. He is additionally qualified in both CISM (IT Carlow) and Psychological
First Aid (International Federation of Red Cross, Copenhagen). Areas of experience and interest
include: Psychological therapies (primarily cognitive behavioural therapy/CBT), occupational
stress, psychological trauma and PTSD, online mental health support, and training/lecturing.
He currently works for the Irish Red Cross where he provides psychosocial support for Syrian
refugees settling in Ireland, as well as training and support for staff and volunteers at the
organisation. Previous employment has included the post of Senior Psychologist at ‘Combat
Stress’, a UK mental health charity for veterans and reservists affected by PTSD as a result of
their service.
Capt (AR) Mathew McCauley is a commissioned army officer and the first consultant
clinical psychologist to serve in the Irish Army Reserve. He is assigned to DF Headquarters
as consultant advisor in the Office of Director, Medical Branch. Capt McCauley completed
his doctoral residency at the UK’s Royal Centre for Defence Medicine, followed by training
at Britain’s Defence School of Healthcare Education and the US Centre for Deployment
Psychology. Prior clinical psychology appointments include six years with the US Department
of Defense as part of a Global War on Terror assignment, where he was based with the USAF’s
238
48th Medical Group, 48th Fighter Wing and 423rd Medical Squadron, 501st Combat Support
Wing. His background also involves seven years with Defence Medical Services, Joint Forces
Command, UK Ministry of Defence (MOD), where he was lead MOD consultant clinical
psychologist in Scotland and Northern Ireland. Capt McCauley has served as an observer
controller on Operation Bushmaster with the US Uniformed Services University of the Health
Sciences. He is currently assigned to NATO’s Science and Technology Organisation and he
remains active in military psychology research as an academic at Trinity College, University
of Dublin. Capt McCauley was the guest editor and co-author of the 2019 Special Issue on
Military Psychology for the Journal of the Royal Army Medical Corps. He is furthermore a co-
founder and committee officer for the Section on Psychology in Defence and Security within
the British Psychological Society; and is also a member of the executive committee of the
Reserve Defence Forces Representative Association.
Comdt Dorota O’Brien is a commissioned army officer and is the first fulltime clinical
psychologist to serve with the Irish Permanent Defence Forces (PDF). She has held this clinical
appointment for over 12 years and is currently the manager of the PDF clinical psychology
service, which operates as part of the DF Central Medical Unit. Comdt O’Brien oversees
the clinical management and provision of psychological care to personnel who serve within
the Irish army, air corps, and naval service. She supports serving personnel on main overseas
deployments to UNIFIL and UNDOF as well as on smaller tours of duty to KFOR, UNTSO
and MINUSMA. As a member of various working groups and boards, she is responsible for
creating and delivering Defence Forces Mental Health and Wellbeing Policy and Defence
Forces Transgender Strategy. On an international level Comdt O'Brien represents Ireland on
the Military Mental Health Expert Panel for NATO and PfP. She remains an active member on
an international panel with her most recent involvement in drafting the consensus of fitness
to deploy for all nations.
Comdt Ken Sheehan is a Communications and Information Services (CIS) Officer with
17 years service. He has served in a wide variety of appointments and units throughout the
Defence Forces, including 1 BTC, 1 Bde HQ, 1 Bde CIS and 2 Bde CIS. Comdt Sheehan has
just completed a two year appointment as OC 1 Bde CIS Coy, where the main effort of the
unit was the roll out of the Virtual Desktop Architecture system. He has served overseas with
UNMIL, EUFOR Chad, KFOR and UNTSO. Comdt Sheehan holds a MA in International
Relations from DCU, a HDip in Leadership, Management and Contemporary Security from
NUIM and a BSc in Computer Science from UCC. He is currently serving overseas with the
115 Inf Bn, UNIFIL.
Lt (NS) Shane Mulcahy is an Operations branch officer with 15 years’ experience in the
Naval Service. He qualified as a Naval Diving Officer in 2010, and was the first DF member to
complete the Royal Canadian Navy’s Mine Warfare and Clearance Diving course in 2013 and
was awarded best student. He deployed to the Mediterranean in 2015 as the Search and Rescue
officer for the first NS overseas humanitarian mission, OPERATION PONTUS. He has served
239
in various appointments ashore and afloat, deploying on diving operations across the country
as a member and officer in charge of the Naval Service Diving Section (NSDS). He holds a
BSc Hons in Nautical Sciences, and is currently completing a LLB in Law while serving as staff
officer in the Naval Operations Command Centre.
Comdt Mike Hosback was commissioned in 2003 as an Infantry Officer. He has served in
a variety of command, staff and training appointments in 2 Bde, the Defence Forces Training
Centre and Defence Forces Head Quarters. His overseas postings include tours of duty with
the United Nations in Liberia and Democratic Republic of Congo, NATO in Kosovo and
the European Union in Somalia. He holds a BA and MEconSc from University College
Dublin, an MA in History and Strategic Studies from NUI Maynooth and an MMAS from the
United States Army Command and General Staff College, Fort Leavenworth, Kansas. Comdt.
Hosback is currently posted as a member of the instructional staff at the Command and Staff
School, Military College.
Caitríona Heinl is Director of The Azure Forum for Contemporary Security Strategy, Ireland.
With over ten years experience in think tank and academic environments, she continues
her work on issues that include international cyber policy, cyber diplomacy/military cyber
stability and the implications of other emerging and disruptive technology security challenges
for state behaviour and international stability as well as the EU and Asia Pacific regional
security architectures. She publishes policy reports, academic articles, and government reports,
contributing to research projects for government and corporate clients. She frequently lectures
and addresses audiences globally, including at forums such as ASEAN/ARF, OSCE, UN,
NATO and Track 1.5/Track 2 government events.
Steven Harland is a strategic advisor currently working with the UK Ministry of Defence
on Information Manoeuvre and Full Spectrum Joint Effects, with a particular emphasis on
operations below the threshold of armed conflict. He has worked on future conflict, Network
Centric Warfare, intelligence fusion for counter terrorism, and the application of cyber and
information operations. Steven was formerly Intelligence and Cyber Programme Lead at MOD
Niteworks and is an Associate Fellow of the British Psychological Society.
Dick Hemsley is a former soldier and airman, who established Vedette Consulting in 2010.
His private passions include the study of military history, whilst his professional interests
are centred around the command and control of integrated operations, and the innovative
exploitation of digitally-shared information and intelligence in their support. The practical
application of strategic theory in the new era of ‘persistent competition’ is a current focus.
240
Mark Williams is a Leverhulme Interdisciplinary Network on Cybersecurity and Society
(LINCS) postgraduate research student at the Senator George J. Mitchell Institute for Global
Peace, Security and Justice at Queen’s University Belfast. His research explores the interface
between the social sciences and electronic engineering and computer science focussing
primarily on the criminal use of social media. In his project, he is looking at ways of detecting
and preventing inappropriate and criminal behaviour in social media, with particular emphasis
on the mitigation, policing and prosecution of offensive online expressions.
Lt (NS) Stephen Ryan is an Operations Branch officer in the Naval Service, commissioned
in 2016 with the 54th Naval Cadet Class. He holds a BSc in Zoology from UCC, a BSc in
Nautical Science from CIT and an MSc in Conservation and Land Management from Bangor
University. His interests include reading, photography, and hiking. He is currently serving as
the Gunnery Officer on LÉ William Butler Yeats.
Lt Col Timothy O’Brien is OIC Planning and Capabilities Section in Defence Forces
Headquarters Directorate of Operations and Planning. Commissioned in 1990 an infantry
officer he has served in a variety of command, staff and training appointments throughout
the Defence Forces, most recently as School Commandant of United Nations Training
School Ireland. His overseas deployments include tours of duty with the United Nations and
NATO in Lebanon, East Timor, Afghanistan, DR Congo and Syria. A graduate of UCG,
DCU, NUI Maynooth and the Institute of Public Administration, Lt Col O’Brien’s academic
qualifications include a Masters in International Relation Relations and a Diploma in European
Union Studies.
Wesley Bourke is the Chief Executive Officer (CEO) of The Irish Military Heritage
Foundation. He holds a Bachelor’s Degree (Hons) in War and Security Studies from the
University of Hull; a Master’s Degree in War in the Modern World from King's College
London; and a Master’s Degree in Military History and Strategic Studies from NUI Maynooth.
He is currently involved in an extensive project exploring identity, culture, and reconciliation
in modern Ireland. He has been invited to participate in The Institute of International and
European Affairs (IIEA) defence series entitled: The Security and Defence of Small European
States: Challenges, Options and Strategies in the European Union.
241
as both an aeronautical engineer and a University academic in Ireland and Australia. He
has extensive experience on fighter aircraft maintenance, airworthiness and structural
integrity management, earned from his 12 years’ career in the Hellenic Air Force as an
Aeronautical Engineering Officer, where he specialised on the Mirage 2000. He is currently
a Major of the reserve force. To date, Dr Kourousis has authored 72 peer reviewed
journal and conference papers and more than 30 technical and engineering reports in the
fields of his research and professional expertise. His research work has been recognised
internationally, has attracted funding from various civil, and defence organisations and
companies. Dr Kourousis has led research, consultancy and training projects on military
airworthiness, funded by the Australian Defence Force technical airworthiness authority
and other defence clients. His work on aerospace metals has been primarily focused on
the development and implementation of plasticity models for military aircraft fatigue life
predictions, for application in life extension and airworthiness sustainment. Dr Kourousis
is a Chartered Engineer, registered with the United Kingdom Engineering Council, and a
Fellow of the Royal Aeronautical Society. He is also a member of the Royal Aeronautical
Society’s Airworthiness and Maintenance Specialist Group and a Professional Member of
the International Federation of Airworthiness.
Capt (AR) Chris O Slatara enlisted FCA 1986 Griffith Barracks . Commissioned 2001
into 20 Inf Bn Rathmines , then served 62 Inf Bn, 1 Mech Coy, and transferred to CIS in
2016, serving as instructor in CIS School, DFTC. Work as Principal Consultant for Version
1 Software in Dublin, largely in database, integration and cloud areas. Experiences with
European Union Battlegroups and Viking led to authoring the End User training syllabi for
Sitaware, the selected Common Operating Picture for the Defence Forces.
242
Printed by the Defence Forces Printing Press Jn15741/Nov2019/2000 243